repo stringlengths 7 90 | file_url stringlengths 81 315 | file_path stringlengths 4 228 | content stringlengths 0 32.8k | language stringclasses 1 value | license stringclasses 7 values | commit_sha stringlengths 40 40 | retrieved_at stringdate 2026-01-04 14:38:15 2026-01-05 02:33:18 | truncated bool 2 classes |
|---|---|---|---|---|---|---|---|---|
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/crypto/Beyond_Quantum/server.py | ctfs/CSAW/2022/Quals/crypto/Beyond_Quantum/server.py | import numpy as np
import sys
from cipher.cipher import Cipher
from cipher.mathutils import random_poly
from sympy.abc import x
from sympy import ZZ, Poly
import math
def encrypt_command(data, public_key):
input_arr = np.unpackbits(np.frombuffer(data, dtype=np.uint8))
input_arr = np.trim_zeros(input_arr, 'b')
output = encrypt(public_key, input_arr, bin_output=True)
output = np.packbits(np.array(output).astype(int)).tobytes().hex()
return output
def poly_to_bytes(poly):
res = poly.set_domain(ZZ).all_coeffs()[::-1]
res = np.packbits(np.array(res).astype(int)).tobytes().hex()
return bytes.fromhex(res)
def decrypt_command(data, private_key):
input_arr = np.unpackbits(np.frombuffer(data, dtype=np.uint8))
input_arr = np.trim_zeros(input_arr, 'b')
output = decrypt(private_key, input_arr, bin_input=True)
output = np.packbits(np.array(output).astype(int)).tobytes().hex()
output = bytes.fromhex(output)
return output
def generate(N, p, q):
cipher = Cipher(N, p, q)
cipher.generate_random_keys()
h = np.array(cipher.h_poly.all_coeffs()[::-1])
f, f_p = np.array(cipher.f_poly.all_coeffs()[::-1]), np.array(cipher.f_p_poly.all_coeffs()[::-1])
private_key = {'N': N, 'p': p, 'q': q, 'f': f, 'f_p': f_p}
public_key = {'N': N, 'p': p, 'q': q, 'h': h}
return (private_key, public_key)
def encrypt(pub_key, input_arr, bin_output=False):
global h_poly
global c_poly
cipher = Cipher(int(pub_key['N']), int(pub_key['p']), int(pub_key['q']))
cipher.h_poly = Poly(pub_key['h'].astype(int)[::-1], x).set_domain(ZZ)
h_poly = cipher.h_poly
if cipher.N < len(input_arr):
raise Exception("Input is too large for current N")
c_poly = cipher.encrypt(Poly(input_arr[::-1], x).set_domain(ZZ), random_poly(cipher.N, int(math.sqrt(cipher.q))))
output = c_poly.all_coeffs()[::-1]
if bin_output:
k = int(math.log2(cipher.q))
output = [[0 if c == '0' else 1 for c in np.binary_repr(n, width=k)] for n in output]
return np.array(output).flatten()
def decrypt(priv_key, input_arr, bin_input=False):
cipher = Cipher(int(priv_key['N']), int(priv_key['p']), int(priv_key['q']))
cipher.f_poly = Poly(priv_key['f'].astype(int)[::-1], x).set_domain(ZZ)
cipher.f_p_poly = Poly(priv_key['f_p'].astype(int)[::-1], x).set_domain(ZZ)
if bin_input:
k = int(math.log2(cipher.q))
pad = k - len(input_arr) % k
if pad == k:
pad = 0
input_arr = np.array([int("".join(n.astype(str)), 2) for n in
np.pad(np.array(input_arr), (0, pad), 'constant').reshape((-1, k))])
if cipher.N < len(input_arr):
raise Exception("Input is too large for current N")
return cipher.decrypt(Poly(input_arr[::-1], x).set_domain(ZZ)).all_coeffs()[::-1]
def get_password():
with open("password.txt") as file:
password = "".join(file.readlines()).strip()
return password
def main():
password = get_password()
print("********** B E Y O N D Q U A N T U M **********\n")
print(" I heard that quantums are flying around these days and")
print("people are thinking of attacking cryptosystems with them.")
print("So I found this awesome cryptosystem that is safe from")
print("quantums! You can send as many qubits as you like at this")
print("cipher, and none of them will break it. Here is a proof of")
print("concept to show the world how robust our cryptosystem is.")
print("I\'ve encrypted a password and no amount of skullduggery")
print("will help you to get it back. See, you can encrypt and")
print("decrypt all you want, you won\'t get anywhere!")
private_key, public_key = generate(N=97, p=3, q=128)
print(" This is an asymmetric cryptosystem so here is the public")
print("key:\n")
print(str(public_key) + "\n")
pwd_ct = encrypt_command(password.encode(), public_key)
print(" The password ciphertext is " + pwd_ct + "\n")
print(" Have at it!\n")
while True:
print("/------------------------------\\")
print("| COMMANDS |")
print("| |")
print("| 1) ciphertext_as_poly |")
print("| 2) publickey_as_poly |")
print("| 3) solve_challenge <password> |")
print("| 4) exit |")
print("\\------------------------------/\n")
print("> ", end="")
sys.stdout.flush()
parts = sys.stdin.readline()[:-1].split(" ")
try:
if parts[0] == "ciphertext_as_poly" or parts[0] == "1":
print(c_poly)
sys.stdout.flush()
elif parts[0] == "publickey_as_poly" or parts[0] == "2":
print(h_poly)
sys.stdout.flush()
elif parts[0] == "solve_challenge" or parts[0] == "3":
candidate_password = parts[1]
if candidate_password == password:
print("\nWhat?! How did you do that??\n")
with open("flag.txt") as file:
print("".join(file.readlines()))
else:
print("\nNope!\n")
elif parts[0] == "exit" or parts[0] == "4":
print("\nBye!")
sys.stdout.flush()
return
else:
print("\nUnknown command.")
raise Exception()
except:
print("\nSomething went wrong...")
print("...try again?\n")
sys.stdout.flush()
if __name__ == "__main__":
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/crypto/PoodleGiftShop/server.py | ctfs/CSAW/2022/Quals/crypto/PoodleGiftShop/server.py | #!/usr/bin/python3
import hashlib
import hmac
import sys
from base64 import b64encode, b64decode
from Crypto import Random
from Crypto.Cipher import AES
key = open('./key', 'r').read().strip().encode()
flag = open('./flag.txt', 'r').readline().strip().encode()
def get_hmac(m):
return hmac.new(key, msg=m, digestmod=hashlib.sha256).digest()
def hmac_is_valid(pt):
digest = pt[-32:]
msg = pt[:-32]
return equal_bytearrays(hmac.new(key, msg=msg, digestmod=hashlib.sha256).digest(), digest)
def equal_bytearrays(a1, a2):
if len(a1) != len(a2):
return False
else:
for i in range(len(a1)):
if a1[i] != a2[i]:
return False
return True
def pad(pt):
pad_value = 16 - len(pt) % 16
pt = pt + (chr(pad_value) * pad_value).encode()
return pt
def verify_padding_and_unpad(pt):
pad_value = pt[-1]
if pad_value == 0 or pad_value > 32:
return False
else:
pt = pt[:(-1 * pad_value)]
return pad_value, pt
def encrypt(pt):
iv = Random.new().read(AES.block_size)
cipher = AES.new(key, AES.MODE_CBC, iv)
ct = cipher.encrypt(pt)
ct = iv + ct
ct = b64encode(ct)
return ct
def decrypt(ct):
ct_incl_iv = b64decode(ct)
iv, ct = ct_incl_iv[:16], ct_incl_iv[16:]
cipher = AES.new(key, AES.MODE_CBC, iv)
return cipher.decrypt(ct)
def decrypt_and_verify(ct):
pt = decrypt(ct)
pad, pt = verify_padding_and_unpad(pt)
if pt and hmac_is_valid(pt):
print(
"\nValid plaintext. We assume you have purchased our flag decryption key and can therefore read the flag. Thank you for your patronage.\n")
return True
print("Something went wrong during decryption. Try again?")
return False
def get_canine_order():
print("What type of canine would you like to purchase?")
print("> ", end="")
canine_type = input().encode()
print("\nHow many would you like to purchase? (We have unlimited supplies...)")
print("> ", end="")
canine_quant = input().encode()
return canine_type, canine_quant
def process_encryption():
canine_type, canine_order = get_canine_order()
msg = b"Congratulations, you just completed your " + canine_type + b" purchase instead of buying this beautiful flag: " + flag
msg += b". What were you thinking? Fortunately you have helped " + canine_order + b" canines and puppies find homes"
hmac = get_hmac(msg)
pt = msg + hmac
pt = pad(pt)
ct = encrypt(pt)
print()
print(b"A plane flies overhead flying a banner that reads: " + ct, "\n")
return ct
def get_selection():
print("Enter your selection:")
print(" 1) Enter the shop")
print(" 2) Decrypt")
print(" 3) Leave the shop\n")
print("> ", end='')
selection = input().strip()
if selection in list('123'):
print("")
return selection
else:
print("Error: Invalid selection.")
exit(0)
def main():
print("********** C S A W G I F T S H O P **********\n")
print(" Welcome to the CSAW Canine Gift Shop! ")
print("Leaving city dwellers have asked us to find home for their MANY canine friends.")
print("We have canines of all kinds ... as well as encrypted flags constantly flying ")
print("overhead and a key to decrypt them that should be well within your price range.\n\n")
while (1):
selection = int(get_selection())
try:
if selection == 1:
process_encryption()
sys.stdout.flush()
elif selection == 2:
print("Enter the base64-encoded ciphertext to decrypt: ")
print("> ", end='')
ct = input().encode()
decrypt_and_verify(ct)
sys.stdout.flush()
elif selection == 3:
print("Thank you for shopping with CSAW!")
exit(0)
else:
print("Error: invalid menu option.")
raise Exception
except Exception as ex:
print("\nSomething went wrong......try again?\n")
sys.stdout.flush()
if __name__ == "__main__":
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/run.py | ctfs/CSAW/2022/Quals/web/GoodIntentions/server/run.py | from application.main import app
from application.database import migrate_db
with app.app_context():
migrate_db()
app.run(host='0.0.0.0', port=1337, debug=False) | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/util.py | ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/util.py | import os
from flask import current_app, abort
from flask_login import current_user
import functools
generate = lambda x: os.urandom(x).hex()
def admin_only(f):
@functools.wraps(f)
def wrap(*args, **kwargs):
if current_user.username == current_app.config['ADMIN_USERNAME']:
return f(*args, **kwargs)
else:
return abort(401)
return wrap
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/main.py | ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/main.py | from flask import Flask, current_app
from flask_login import LoginManager
from flask_session import Session
import logging
import logging.config
from application.blueprints.routes import web, api, response
from application.database import db, User
app=Flask(__name__)
app.config.from_object('application.config.Config')
logging.config.fileConfig(f"/app/application/static/conf/default.conf")
db.init_app(app)
db.create_all(app=app)
login_manager = LoginManager()
login_manager.init_app(app)
sess = Session()
sess.init_app(app)
app.register_blueprint(web, url_prefix='/')
app.register_blueprint(api, url_prefix='/api')
@login_manager.user_loader
def load_user(user_id):
return User.query.get(int(user_id))
@app.errorhandler(404)
def not_found(error):
return response('404 Not Found'), 404
@app.errorhandler(403)
def forbidden(error):
return response('403 Forbidden'), 403
@app.errorhandler(400)
def bad_request(error):
return response('400 Bad Request'), 400
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/database.py | ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/database.py | from flask_sqlalchemy import SQLAlchemy
from flask_login import UserMixin
from flask import current_app
db = SQLAlchemy()
class User(db.Model, UserMixin):
id = db.Column(db.Integer, primary_key=True)
username = db.Column(db.String(100), unique=True)
password = db.Column(db.String(100))
class Image(db.Model, UserMixin):
id = db.Column(db.Integer, primary_key=True)
username = db.Column(db.String(100))
location = db.Column(db.String(100), unique=True)
def clear_db():
meta = db.metadata
for table in reversed(meta.sorted_tables):
db.session.execute(table.delete())
db.session.commit()
def migrate_db():
clear_db()
# admin user
db.session.add(User(id=1, username=current_app.config['ADMIN_USERNAME'], password=current_app.config['ADMIN_PASSWORD']))
db.session.commit() | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/config.py | ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/config.py | from application.util import generate
import os
class Config(object):
ADMIN_USERNAME = 'admin'
ADMIN_PASSWORD = generate(15)
UPLOAD_FOLDER = f'{os.getcwd()}/application/static'
SECRET_KEY = generate(50)
SESSION_PERMANENT = False
SESSION_TYPE = 'filesystem'
SESSION_KEY_PREFIX = ''
SESSION_FILE_THRESHOLD = 20
SESSION_USE_SIGNER = False
SQLALCHEMY_DATABASE_URI = 'sqlite:///database.db'
SQLALCHEMY_TRACK_MODIFICATIONS = False
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/static/docs/api_client.py | ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/static/docs/api_client.py | # Sample API client for users who want to get started helping us collect and label space pictures!
import requests
import json
api_url = "http://[IP]:[PORT]"
username = "[USERNAME HERE]"
password = "[PASSWORD HERE]"
image_file = "[FILE NAME HERE]"
label = "[LABEL HERE]"
def register(username, password):
url = api_url + "/api/register"
payload = json.dumps({
"username": username,
"password": password
})
headers = {
'Content-Type': 'application/json'
}
response = requests.request("POST", url, headers=headers, data=payload)
return response
def login(username, password):
url = api_url + "/api/login"
payload = json.dumps({
"username": username,
"password": password
})
headers = {
'Content-Type': 'application/json'
}
connection = requests.Session()
response = connection.request("POST", url, headers=headers, data=payload)
return response,connection
def upload(connection, filename, label):
url = api_url + "/api/upload"
with open(filename, "rb") as f:
data = f.read()
files = {'file': data}
#Edit the label appropriately
values = {'label': label}
response = connection.request("POST", url, files=files, data=values)
return response
def main():
response = register(username, password)
print(response.text)
response, connection = login(username, password)
print(response.text)
response = upload(connection, image_file, label)
print(response.text)
if __name__ == "__main__":
main() | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/blueprints/routes.py | ctfs/CSAW/2022/Quals/web/GoodIntentions/server/application/blueprints/routes.py | import json
from application.database import User, Image, db, migrate_db
from application.util import admin_only, generate
import sys, os
from subprocess import PIPE, run
from flask import Blueprint, jsonify, redirect, render_template, request, current_app, send_file
from flask_login import current_user, login_required, login_user, logout_user
from werkzeug.utils import secure_filename
import logging
import logging.config
logger = logging.getLogger(__name__)
web = Blueprint('web', __name__)
api = Blueprint('api', __name__)
"""
Front-end of the site is currently in development but we've put placeholders for now...
"""
def response(message):
return jsonify({'message': message})
@web.route('/', methods=['GET'])
def landing_page():
return render_template('landing.html')
#WORK IN PROGRESS
"""@web.route('/login', methods=['GET'])
def login():
return render_template('login.html')
"""
@api.route('/login', methods=['POST'])
def user_login():
current_app.logger.debug("Entering login")
if not request.is_json:
return response('Missing required parameters!'), 401
data = request.get_json()
username = data.get('username', '')
password = data.get('password', '')
if not username or not password:
return response('Missing required parameters!'), 401
user = User.query.filter_by(username=username).first()
if not user or not user.password == password:
return response('Invalid username or password!'), 403
login_user(user)
return response('User authenticated successfully!')
#WORK IN PROGRESS
"""@web.route('/register', methods=['GET'])
def register():
return render_template('register.html')
"""
@api.route('/register', methods=['POST'])
def user_registration():
current_app.logger.debug("Entering register")
if not request.is_json:
return response('Missing required parameters!'), 401
data = request.get_json()
username = data.get('username', '')
password = data.get('password', '')
if not username or not password:
return response('Missing required parameters!'), 401
user = User.query.filter_by(username=username).first()
if user:
return response('User already exists!'), 401
new_user = User(username=username, password=password)
db.session.add(new_user)
db.session.commit()
return response('User registered successfully!')
#return redirect('/')
#WORK IN PROGRESS
"""@web.route('/logout')
@login_required
def logout():
logout_user()
return redirect('/')
"""
@api.route('/gallery', methods=['GET'])
@login_required
def gallery():
current_app.logger.debug("Entering gallery")
query = Image.query.filter_by(username=current_user.username).all()
locations = []
for image in query:
locations.append(image.location)
return response(locations)
@api.route('/download_image', methods=['GET'])
@login_required
def download_image():
current_app.logger.debug("Entering download image")
if 'file' not in request.args:
return response('Missing required parameters!'), 401
query = Image.query.filter_by(location=request.args["file"]).first()
if query.location:
return send_file(f"{current_app.config['UPLOAD_FOLDER']}/images/{query.location}")
else:
return response("File not found!")
@api.route('/upload', methods=['POST'])
@login_required
def upload_image():
if 'file' not in request.files or 'label' not in request.form:
return response('Missing required parameters!'), 401
file = request.files['file']
label=request.form["label"]
if file.filename == '':
return response('Missing required parameters!'), 401
rand_dir = generate(15)
upload_dir = f"{current_app.config['UPLOAD_FOLDER']}/images/{rand_dir}/"
os.makedirs(upload_dir, exist_ok=True)
filename = secure_filename(str(label + "_" + generate(10)))
file.save(upload_dir + filename)
new_file = Image(username=current_user.username, location=f"{rand_dir}/{filename}")
db.session.add(new_file)
db.session.commit()
return response("File successfully uploaded")
#One of the volunteers keeps messing with the logger config. Doing this as a temporary fix so I can fix remotely...
#If you're the one doing it and reading this, please stop.
@api.route('/log_config', methods=['POST'])
@login_required
def log_config():
if not request.is_json:
return response('Missing required parameters!'), 401
data = request.get_json()
file_name = data.get('filename', '')
logging.config.fileConfig(f"{current_app.config['UPLOAD_FOLDER']}/conf/{file_name}")
return response(data)
#WORK IN PROGRESS
"""@web.route('/admin')
@login_required
@admin_only
def admin_panel():
pass
"""
# One of the guys cant get his VPN working on his laptop and complains he needs to do some checks remotely...
@api.route('/run_command', methods=['POST'])
@login_required
@admin_only
def remote_exec():
if not request.is_json:
return response('Missing required parameters!')
data = request.get_json()
command = data.get('command','')
result = run(command, stdout=PIPE, stderr=PIPE, shell=True)
return response(result.stdout.decode())
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/CSAW/2020/Quals/slithery/sandbox.py | ctfs/CSAW/2020/Quals/slithery/sandbox.py | #!/usr/bin/env python3
from base64 import b64decode
import blacklist # you don't get to see this :p
"""
Don't worry, if you break out of this one, we have another one underneath so that you won't
wreak any havoc!
"""
def main():
print("EduPy 3.8.2")
while True:
try:
command = input(">>> ")
if any([x in command for x in blacklist.BLACKLIST]):
raise Exception("not allowed!!")
final_cmd = """
uOaoBPLLRN = open("sandbox.py", "r")
uDwjTIgNRU = int(((54 * 8) / 16) * (1/3) - 8)
ORppRjAVZL = uOaoBPLLRN.readlines()[uDwjTIgNRU].strip().split(" ")
AAnBLJqtRv = ORppRjAVZL[uDwjTIgNRU]
bAfGdqzzpg = ORppRjAVZL[-uDwjTIgNRU]
uOaoBPLLRN.close()
HrjYMvtxwA = getattr(__import__(AAnBLJqtRv), bAfGdqzzpg)
RMbPOQHCzt = __builtins__.__dict__[HrjYMvtxwA(b'X19pbXBvcnRfXw==').decode('utf-8')](HrjYMvtxwA(b'bnVtcHk=').decode('utf-8'))\n""" + command
exec(final_cmd)
except (KeyboardInterrupt, EOFError):
return 0
except Exception as e:
print(f"Exception: {e}")
if __name__ == "__main__":
exit(main())
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/pwn/Blind_Shell/blind.py | ctfs/ImaginaryCTF/2021/pwn/Blind_Shell/blind.py | #!/usr/bin/env python3.8
from subprocess import run
if __name__ == "__main__":
while True:
cmd = input(">>> ")
proc = run([cmd], capture_output=True, shell=True, timeout=60)
if proc.returncode == 0:
print("SUCCESS")
else:
print("FAILURE") | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/pwn/ICICLE_Jail/pwn.py | ctfs/ImaginaryCTF/2021/pwn/ICICLE_Jail/pwn.py | #!/usr/bin/python3 -u
from icicle import *
if __name__ == '__main__':
code = input("Enter a line of icicle code: ")
blacklist = ["read", "write", "flag", "txt", "ictf"]
for i in blacklist:
if i in code:
print("Don't hack me!")
exit()
vm = VM(program=code)
vm.run() | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/pwn/ICICLE_Jail/icicle.py | ctfs/ImaginaryCTF/2021/pwn/ICICLE_Jail/icicle.py | #!/usr/bin/env python3
import sys
from Crypto.Util.number import *
import time
MEMSIZE = 2**16
REGNAMES = ["r%d"%i for i in range(16)]+['rip']
DEBUG = 0
def prd(*args):
if DEBUG:
print(*args)
class MemoryException(Exception):
pass
class Memory():
def __init__(self, size=MEMSIZE, mem=None, rnames=REGNAMES):
if mem is not None:
self.size = mem.size
self.regs = {k:mem.regs[k] for k in mem.regs}
self.ram = {k:mem.ram[k] for k in mem.ram}
self.regs['rip'] = 0
else:
self.size = size
self.regs = {r:0 for r in rnames}
self.ram = {}
def setRam(self, addr, val):
if type(addr) != int:
raise MemoryException("Attempting to access invalid memory address "+str(addr))
if addr < 0 or addr >= self.size:
raise MemoryException("Memory "+str(addr)+" out of bounds!")
self.ram[addr] = val
def getRam(self, addr):
if type(addr) != int:
raise MemoryException("Attempting to access invalid memory address "+str(addr))
if addr < 0 or addr >= self.size:
raise MemoryException("Memory "+str(addr)+" out of bounds!")
if addr in self.ram:
return self.ram[addr]
self.ram[addr] = 0
return 0
def getVal(self, val):
if type(val) != str or len(val) == 0:
raise MemoryException("Bad value "+str(val)+" recieved!")
if val.isdigit():
return int(val)
if val in self.regs:
return self.regs[val]
if val[0] == '[' and val[-1] == ']':
return self.getRam(self.getVal(val[1:-1]))
if val[0] == '"' and val[-1] == '"':
return val[1:-1]
if val[0] == "'" and val[-1] == "'":
return val[1:-1]
raise MemoryException("Bad value "+str(val)+" recieved!")
def assign(self, loc, val):
if type(loc) != str or len(loc) == 0:
raise MemoryException("Bad location "+str(loc)+" recieved!")
if loc in self.regs:
self.regs[loc] = val
return
if loc[0] == '[' and loc[-1] == ']':
self.setRam(self.getVal(loc[1:-1]), val)
def rip(self):
return self.regs['rip']
def inc_rip(self):
self.regs['rip'] += 1
class VM():
def __init__(self, program='', memory=None):
self.program = self.parseStr(program)
if memory is not None:
self.mem = Memory(mem=memory)
else:
self.mem = Memory(size=MEMSIZE)
self.insns_map = {"add": self.add,
"sub": self.sub,
"mult": self.mult,
"div": self.div,
"mod": self.mod,
"xor": self.xor,
"and": self.andd,
"or": self.orr,
"rev": self.rev,
"mov": self.mov,
"strint": self.strint,
"intstr": self.intstr,
"pr": self.pr,
"readstr": self.readstr,
"readint": self.readint,
"j": self.jump,
"jnz": self.jnz,
"jz": self.jz,
"jl": self.jl,
"readf": self.readf,
"writef": self.writef,
"exec": self.exec,
} # also labels
def quit(self, msg='', exitcode=1, test=False):
if exitcode != 0:
print("Error running line '", self.c_insn(), "' at insn pointer", self.mem.rip())
if msg == '':
print("Quitting...")
else:
print(msg)
exit(exitcode)
def parseStr(self, s):
return [line.strip() for line in s.split('\n')]
def parseInsn(self, insn):
args = insn.split("#")[0].strip().split(" ")
cmd = args[0]
rest = " ".join(args[1:]).strip().split(", ")
return [cmd]+rest
def c_insn(self):
return self.program[self.mem.rip()]
def run(self):
try:
while self.mem.rip() < len(self.program):
prd("Executing '"+self.c_insn()+"' at insn_pointer "+str(self.mem.rip()))
self.execute_insn(self.c_insn())
self.mem.inc_rip()
except MemoryException as e:
self.quit(str(e))
except Exception as e:
print("Unknown error occurred.")
if DEBUG:
raise e
self.quit()
def execute_insn(self, insn):
if insn == '' or insn[-1] == ':' or insn[0] == "#":
return
args = self.parseInsn(insn)
prd(args)
self.insns_map[args[0]](*args[1:])
def setRam(self, addr, val):
return self.mem.setRam(addr, val)
def getRam(self, addr):
return self.mem.getRam(addr)
def getVal(self, val):
return self.mem.getVal(val)
def assign(self, loc, val):
return self.mem.assign(loc, val)
def reset(self):
self.mem = Memory()
def add(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != type(a2):
a1 = str(a1)
a2 = str(a2)
self.assign(args[0], a1+a2)
def sub(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("sub args not int!")
self.assign(args[0], a1-a2)
def mult(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) == str or type(a2) == str:
self.quit("Both mult args are strings!")
self.assign(args[0], a1*a2)
def div(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("div args not int!")
self.assign(args[0], a1//a2)
def mod(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("mod args not int!")
self.assign(args[0], a1%a2)
def andd(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("and args not int!")
self.assign(args[0], a1&a2)
def orr(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("or args not int!")
self.assign(args[0], a1|a2)
def xor(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) == int and type(a2) == int:
self.assign(args[0], a1^a2)
else:
a1 = long_to_bytes(a1).decode() if type(a1) == int else a1
a2 = long_to_bytes(a2).decode() if type(a2) == int else a2
self.assign(args[0], self.xorstr(a1, a2))
def xorstr(self, s1, s2):
l = max(len(s1), len(s2))
s1 = s1.encode()
s2 = s2.encode()
ret = ''
for i in range(l):
ret += chr(s1[i%len(s1)]^s2[i%len(s2)])
return ret
def readint(self, *args):
try:
self.assign(args[0], int(input()))
except ValueError as e:
self.quit("Bad int input!")
def readstr(self, *args):
self.assign(args[0], input())
def pr(self, *args):
print(self.getVal(args[0]), end='', flush=True)
def strint(self, *args):
a1 = self.getVal(args[1])
if type(a1) != str:
self.quit("Attempting to convert non-string to int!")
self.assign(args[0], bytes_to_long(bytes([ord(i) for i in a1])))
def intstr(self, *args):
a1 = self.getVal(args[1])
if type(a1) != int:
self.quit("Attempting to convert non-int to string!")
try:
b = bytes.fromhex(hex(a1)[2:])
except ValueError as e:
if 'non-hexadecimal' not in str(e):
raise e
b = bytes.fromhex('0'+hex(a1)[2:])
self.assign(args[0], ''.join([chr(i) for i in b]))
def revint(self, i):
sign = 0 if not i else (1 if i>0 else -1)
return sign*int(str(abs(i))[::-1])
def rev(self, *args):
a1 = self.getVal(args[1])
if type(a1) == int:
ret = self.revint(a1)
else:
ret = a1[::-1]
self.assign(args[0], ret)
def mov(self, *args):
self.assign(args[0], self.getVal(args[1]))
def jump(self, *args):
for i, insn in enumerate(self.program):
if insn == args[0]+':':
self.assign('rip', i)
return
self.quit("Could not find label "+args[0]+"!")
def jz(self, *args):
if self.getVal(args[0]) == 0:
self.jump(args[1])
def jnz(self, *args):
if self.getVal(args[0]) != 0:
self.jump(args[1])
def jl(self, *args):
if self.getVal(args[0]) < self.getVal(args[1]):
self.jump(args[2])
def readf(self, *args):
a1 = self.getVal(args[1])
if type(a1) != str:
self.quit("Filename not str!")
try:
with open(a1, 'r') as f:
self.assign(args[0], f.read())
except FileNotFoundError:
self.quit("File "+a1+" not found!")
def writef(self, *args):
a1 = self.getVal(args[1])
if type(a1) != str:
a1 = str(a1)
try:
with open(a1, 'w') as f:
f.write(str(self.getVal(args[0])))
except FileNotFoundError:
self.quit("File "+a1+" not found!")
def exec(self, *args):
code = self.getVal(args[0])
if type(code) == int:
code = ''.join([chr(i) for i in long_to_bytes(code)])
tempVM = VM(program=code, memory=self.mem)
ip = self.mem.rip()
tempVM.run()
self.mem = tempVM.mem
self.assign('rip', ip)
if __name__ == '__main__':
args = sys.argv
if len(args) < 2:
self.quit("Usage: ./icicle.py [filename]", 0)
with open(sys.argv[1], 'r') as f:
vm = VM(program=f.read())
vm.run() | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/pwn/Frozen_exploit/icicle.py | ctfs/ImaginaryCTF/2021/pwn/Frozen_exploit/icicle.py | import ast, operator, random, string, sys
from itertools import cycle
TRACE = False
def as_b(x):
if isinstance(x, bytes): return x
return str(x).encode()
def bytes_to_long(a):
return int.from_bytes(a, "big")
def long_to_bytes(a):
return a.to_bytes((a.bit_length() + 7) // 8, "big") or b"\x00"
def equalize(a, b, conv=as_b):
if type(a) == type(b):
return a, b
if not isinstance(a, bytes):
return conv(a), b
if not isinstance(b, bytes):
return a, conv(b)
return a, b
def safesplit(s, sep=None, n=None):
def sepstart(x):
if sep is not None:
return x.startswith(sep), len(sep)
y = x
while y and y[0] in string.whitespace:
y = y[1:]
return len(y) != len(x), len(x) - len(y)
instr = False
parts = []
i = 0
start = 0
while i < len(s):
if s[i] == '"':
instr = not instr
elif s[i] == '\\' and s[i+1] == '"':
i += 1
elif not instr:
is_sep, L = sepstart(s[i:])
if is_sep:
parts.append(s[start:i])
i += L
start = i
if n is not None:
n -= 1
if n <= 0:
break
continue
i += 1
parts.append(s[start:])
return parts
class Val:
def __init__(self, vm, arg):
self.vm = vm
self.arg = arg
self.child = None
if arg.startswith("["):
assert arg.endswith("]")
self.child = Val(vm, arg[1:-1])
def __call__(self):
if self.arg.startswith("r"):
return self.vm.regs[self.arg]
elif self.arg.startswith("["):
return self.vm.memory[self.child()]
r = ast.literal_eval(self.arg)
if not isinstance(r, int): return as_b(r)
return r
def store(self, val):
assert self.arg.startswith("r") or self.arg.startswith("[")
if self.arg.startswith("r"):
self.vm.regs[self.arg] = val
else:
self.vm.memory[self.child()] = val
def loc(self):
if self.arg in self.vm.labels:
return self.vm.labels[self.arg]
else:
return self()
def __str__(self):
return self.arg
def wrap(f):
return lambda self, r, a, b: r.store(f(*equalize(a(), b())))
def cjump(cond):
def f(self, *args):
if cond(*args[:-1]):
self._vm.regs["rip"] = args[-1].loc()
return f
def store_left_evaled(f):
return lambda self, r, *args: r.store(f(*[x() for x in args]))
def xor(a, b):
a, b = equalize(a, b, long_to_bytes)
if isinstance(a, int):
return a ^ b
a, b = sorted([a, b], key=len)
return bytes(x ^ y for x, y in zip(cycle(a), b))
class Op:
def __init__(self, vm, op, args):
self._vm = vm
self._op = op
self._args = [Val(vm, arg) for arg in args]
def __call__(self):
return getattr(self, f"op_{self._op}")(*self._args)
def __str__(self):
return f"{self._op} {', '.join(map(str, self._args))}"
op_add = wrap(operator.add)
op_sub = wrap(operator.sub)
op_mult = wrap(operator.mul)
op_div = wrap(operator.floordiv)
op_mod = wrap(operator.mod)
op_and = wrap(operator.and_)
op_or = wrap(operator.or_)
op_xor = store_left_evaled(xor)
op_rev = store_left_evaled(lambda a: type(a)(as_b(a)[::-1]))
op_mov = store_left_evaled(lambda a: a)
op_strint = store_left_evaled(bytes_to_long)
op_intstr = store_left_evaled(long_to_bytes)
def op_pr(self, x):
print(as_b(x()).decode(), end="")
op_readstr = store_left_evaled(lambda: sys.stdin.buffer.readline()[:-1])
op_readint = store_left_evaled(lambda: int(input()))
op_j = cjump(lambda: True)
op_jnz = cjump(lambda x: x() != 0)
op_jz = cjump(lambda x: x() == 0)
op_jl = cjump(lambda a, b: a() < b())
op_randbyte = store_left_evaled(lambda: random.randrange(256))
def op_flag(self, r):
with open("flag.txt", "rb") as f:
r.store(f.read())
class VM:
def __init__(self, instructions):
self.instructions = instructions
self.regs = {f"r{i}": 0 for i in range(16)} | {"rip": 0}
self.memory = [0 for _ in range(1<<16)]
self.labels = {}
@classmethod
def from_file(cls, file):
res = VM([])
res._parse(file.readlines())
return res
def _parse_line(self, line):
line = safesplit(line, "#", 1)[0]
if not line.strip():
return None
line = " ".join(safesplit(line.strip()))
op, args = safesplit(line + " ", " ", 1)
if line.strip().endswith(":"):
self.labels[line[:-1]] = len(self.instructions)
return None
return Op(self, op, safesplit(args.strip(), ", "))
def _parse(self, lines):
for line in lines:
if (op := self._parse_line(line)) is not None:
self.instructions.append(op)
def run(self):
while True:
rip = self.regs["rip"]
if not 0 <= rip < len(self.instructions):
break
op = self.instructions[rip]
self.regs["rip"] += 1
if TRACE:
print(f"Executing {op}", file=sys.stderr)
print("\n".join(f"{k}: {v}" for k, v in sorted(self.regs.items())), file=sys.stderr)
print(self.memory[self.regs["r14"]:self.regs["r14"] + 50], file=sys.stderr) # Dumping the stack frame :)
print(file=sys.stderr)
op()
if __name__ == "__main__":
random.seed(0x31337 + 42)
if len(sys.argv) > 1:
f = open(sys.argv[1])
else:
f = sys.stdin
if "TRACE" in sys.argv[2:]:
TRACE = True
VM.from_file(f).run()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/ICICLEs_Facing_the_Sky/icicle.py | ctfs/ImaginaryCTF/2021/rev/ICICLEs_Facing_the_Sky/icicle.py | #!/usr/bin/env python3
import sys
from Crypto.Util.number import *
import time
MEMSIZE = 2**16
REGNAMES = ["r%d"%i for i in range(16)]+['rip']
DEBUG = 0
def prd(*args):
if DEBUG:
print(*args)
class MemoryException(Exception):
pass
class Memory():
def __init__(self, size=MEMSIZE, mem=None, rnames=REGNAMES):
if mem is not None:
self.size = mem.size
self.regs = {k:mem.regs[k] for k in mem.regs}
self.ram = {k:mem.ram[k] for k in mem.ram}
self.regs['rip'] = 0
else:
self.size = size
self.regs = {r:0 for r in rnames}
self.ram = {}
def setRam(self, addr, val):
if type(addr) != int:
raise MemoryException("Attempting to access invalid memory address "+str(addr))
if addr < 0 or addr >= self.size:
raise MemoryException("Memory "+str(addr)+" out of bounds!")
self.ram[addr] = val
def getRam(self, addr):
if type(addr) != int:
raise MemoryException("Attempting to access invalid memory address "+str(addr))
if addr < 0 or addr >= self.size:
raise MemoryException("Memory "+str(addr)+" out of bounds!")
if addr in self.ram:
return self.ram[addr]
self.ram[addr] = 0
return 0
def getVal(self, val):
if type(val) != str or len(val) == 0:
raise MemoryException("Bad value "+str(val)+" recieved!")
if val.isdigit():
return int(val)
if val in self.regs:
return self.regs[val]
if val[0] == '[' and val[-1] == ']':
return self.getRam(self.getVal(val[1:-1]))
if val[0] == '"' and val[-1] == '"':
return val[1:-1]
if val[0] == "'" and val[-1] == "'":
return val[1:-1]
raise MemoryException("Bad value "+str(val)+" recieved!")
def assign(self, loc, val):
if type(loc) != str or len(loc) == 0:
raise MemoryException("Bad location "+str(loc)+" recieved!")
if loc in self.regs:
self.regs[loc] = val
return
if loc[0] == '[' and loc[-1] == ']':
self.setRam(self.getVal(loc[1:-1]), val)
def rip(self):
return self.regs['rip']
def inc_rip(self):
self.regs['rip'] += 1
class VM():
def __init__(self, program='', memory=None):
self.program = self.parseStr(program)
if memory is not None:
self.mem = Memory(mem=memory)
else:
self.mem = Memory(size=MEMSIZE)
self.insns_map = {"add": self.add,
"sub": self.sub,
"mult": self.mult,
"div": self.div,
"mod": self.mod,
"xor": self.xor,
"and": self.andd,
"or": self.orr,
"rev": self.rev,
"mov": self.mov,
"strint": self.strint,
"intstr": self.intstr,
"pr": self.pr,
"readstr": self.readstr,
"readint": self.readint,
"j": self.jump,
"jnz": self.jnz,
"jz": self.jz,
"jl": self.jl,
} # also labels
def quit(self, msg='', exitcode=1, test=False):
if exitcode != 0:
print("Error running line '", self.c_insn(), "' at insn pointer", self.mem.rip())
if msg == '':
print("Quitting...")
else:
print(msg)
exit(exitcode)
def parseStr(self, s):
return [line.strip() for line in s.split('\n')]
def parseInsn(self, insn):
args = insn.split("#")[0].strip().split(" ")
cmd = args[0]
rest = " ".join(args[1:]).strip().split(", ")
return [cmd]+rest
def c_insn(self):
return self.program[self.mem.rip()]
def run(self):
try:
while self.mem.rip() < len(self.program):
prd("Executing '"+self.c_insn()+"' at insn_pointer "+str(self.mem.rip()))
self.execute_insn(self.c_insn())
self.mem.inc_rip()
except MemoryException as e:
self.quit(str(e))
except Exception as e:
print("Unknown error occurred.")
if DEBUG:
raise e
self.quit()
def execute_insn(self, insn):
if insn == '' or insn[-1] == ':' or insn[0] == "#":
return
args = self.parseInsn(insn)
prd(args)
self.insns_map[args[0]](*args[1:])
def setRam(self, addr, val):
return self.mem.setRam(addr, val)
def getRam(self, addr):
return self.mem.getRam(addr)
def getVal(self, val):
return self.mem.getVal(val)
def assign(self, loc, val):
return self.mem.assign(loc, val)
def reset(self):
self.mem = Memory()
def add(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != type(a2):
a1 = str(a1)
a2 = str(a2)
self.assign(args[0], a1+a2)
def sub(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("sub args not int!")
self.assign(args[0], a1-a2)
def mult(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) == str or type(a2) == str:
self.quit("Both mult args are strings!")
self.assign(args[0], a1*a2)
def div(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("div args not int!")
self.assign(args[0], a1//a2)
def mod(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("mod args not int!")
self.assign(args[0], a1%a2)
def andd(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("and args not int!")
self.assign(args[0], a1&a2)
def orr(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("or args not int!")
self.assign(args[0], a1|a2)
def xor(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) == int and type(a2) == int:
self.assign(args[0], a1^a2)
else:
a1 = long_to_bytes(a1).decode() if type(a1) == int else a1
a2 = long_to_bytes(a2).decode() if type(a2) == int else a2
self.assign(args[0], self.xorstr(a1, a2))
def xorstr(self, s1, s2):
l = max(len(s1), len(s2))
s1 = s1.encode()
s2 = s2.encode()
ret = ''
for i in range(l):
ret += chr(s1[i%len(s1)]^s2[i%len(s2)])
return ret
def readint(self, *args):
try:
self.assign(args[0], int(input()))
except ValueError as e:
self.quit("Bad int input!")
def readstr(self, *args):
self.assign(args[0], input())
def pr(self, *args):
print(self.getVal(args[0]), end='', flush=True)
def strint(self, *args):
a1 = self.getVal(args[1])
if type(a1) != str:
self.quit("Attempting to convert non-string to int!")
self.assign(args[0], bytes_to_long(bytes([ord(i) for i in a1])))
def intstr(self, *args):
a1 = self.getVal(args[1])
if type(a1) != int:
self.quit("Attempting to convert non-int to string!")
try:
b = bytes.fromhex(hex(a1)[2:])
except ValueError as e:
if 'non-hexadecimal' not in str(e):
raise e
b = bytes.fromhex('0'+hex(a1)[2:])
self.assign(args[0], ''.join([chr(i) for i in b]))
def revint(self, i):
sign = 0 if not i else (1 if i>0 else -1)
return sign*int(str(abs(i))[::-1])
def rev(self, *args):
a1 = self.getVal(args[1])
if type(a1) == int:
ret = self.revint(a1)
else:
ret = a1[::-1]
self.assign(args[0], ret)
def mov(self, *args):
self.assign(args[0], self.getVal(args[1]))
def jump(self, *args):
for i, insn in enumerate(self.program):
if insn == args[0]+':':
self.assign('rip', i)
return
self.quit("Could not find label "+args[0]+"!")
def jz(self, *args):
if self.getVal(args[0]) == 0:
self.jump(args[1])
def jnz(self, *args):
if self.getVal(args[0]) != 0:
self.jump(args[1])
def jl(self, *args):
if self.getVal(args[0]) < self.getVal(args[1]):
self.jump(args[2])
if __name__ == '__main__':
args = sys.argv
if len(args) < 2:
self.quit("Usage: ./icicle.py [filename]", 0)
with open(sys.argv[1], 'r') as f:
vm = VM(program=f.read())
vm.run() | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/Roolang/roolang.py | ctfs/ImaginaryCTF/2021/rev/Roolang/roolang.py | #!/usr/bin/env python3
import sys
from PIL import Image
import numpy as np
class Stack(list):
def push(self, x):
self.append(x)
def peek(self):
return self[-1]
stack = Stack([])
program = []
register = 0
insn_pointer = 0
DEBUG = 0
def robinify(im):
tiles = [im[x:x+128,y:y+128,0:4] for x in range(0,im.shape[0],128) for y in range(0,im.shape[1],128)]
R = np.asarray(Image.open("robin.roo"))
O = np.asarray(Image.open("oreos.roo"))
B = np.asarray(Image.open("blind.roo"))
I = np.asarray(Image.open("imag.roo"))
N = np.asarray(Image.open("nobooli.roo"))
d = list(zip([R,O,B,I,N], "robin"))
ret = ''
for c in tiles:
for pair in d:
if np.all(pair[0]==c):
ret += pair[1]
break
return ret
def step():
global insn_pointer
insn = c_insn()
if DEBUG:
print(insn, program[insn_pointer+1], "@", insn_pointer)
eval(insn+"()")
def run(prog):
global insn_pointer, program
for ch in prog:
if ch not in "robin":
print("Syntax Error")
exit(1)
if len(prog) % 5 != 0:
print("Syntax Error")
program = [prog[i:i+5] for i in range(0, len(prog), 5)]
try:
while insn_pointer < len(program):
step()
insn_pointer += 1
if DEBUG:
print(stack)
except Exception as e:
print("Fatal Error.")
raise e
print()
print(stack)
def c_insn():
return program[insn_pointer]
def robin():
global insn_pointer
insn_pointer += 1
toPush = c_insn()
if toPush == "rinin":
stack.push(register)
else:
words = parseDigit(toPush)
toPush = 0
for i in range(words):
insn_pointer += 1
toPush += parseDigit(c_insn())
toPush *= 27
stack.push(toPush//27)
def parseDigit(s):
return int(s.replace('o', '0').replace('b', '1').replace('i', '2')[1:-1], 3)
def rboin():
stack.pop()
def riobn():
stack.push(stack.pop()+stack.pop())
def rooon():
stack.push(stack.pop()-stack.pop())
def riibn():
stack.push(stack.pop()*stack.pop())
def riion():
stack.push(stack.pop()//stack.pop())
def ribon():
stack.push(stack.pop()%stack.pop())
def ronon():
stack.push(stack.pop()&stack.pop())
def roion():
stack.push(stack.pop()|stack.pop())
def roibn():
stack.push(stack.pop()^stack.pop())
def riiin():
x = stack.pop()
stack.push(x)
stack.push(x)
def rioin():
x = stack.pop()
y = stack.pop()
stack.push(x)
stack.push(y)
def rinin():
global register
register = stack.pop()
def rbiin():
print(chr(stack.pop()), end='', flush=True)
def rboon():
print(stack.pop(), end='', flush=True)
def rnbon():
global insn_pointer
insn_pointer += 1
def rioon():
global insn_pointer
insn_pointer += 1
for i, word in enumerate(program):
if word == "rnbon":
if i != len(program)-1 and program[i+1] == c_insn():
insn_pointer = i+1
return
print("Label not found!")
raise RuntimeError
def rbion():
global insn_pointer
if stack.peek():
rioon()
else:
insn_pointer += 1
def ribbn():
global insn_pointer
retval = stack.pop()
insn_pointer = stack.pop()
if DEBUG:
print("returning to", insn_pointer)
stack.push(retval)
def roiin():
global insn_pointer
arg = stack.pop()
stack.push(insn_pointer+1)
stack.push(arg)
rioon()
if __name__ == "__main__":
if len(sys.argv) < 2:
print("Usage: ./roolang.py [filename.roo]")
exit()
if sys.argv[1].split('.')[-1] != "roo":
print("Invalid file format!")
exit()
with Image.open(sys.argv[1]) as f:
print("Parsing...")
program = robinify(np.asarray(f))
print("Running...")
run(program)
print("Finished execution.")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/lookup-rev/wpre.py | ctfs/ImaginaryCTF/2021/rev/lookup-rev/wpre.py | from math import sqrt
from itertools import count, islice
def sequence(index):
"""
Generate a W*****l number given the index
"""
element = (index << index) - 1
return element
def is_prime(n):
"""
Check if a given number is prime
"""
return all(n % i for i in islice(count(2), int(sqrt(n)-1)))
key = [0x6b, 0x60, 0x72, 0x78, 0x30, 0x3d, 0x3f, 0x27, 0x5a, 0x4b, 0x24, 0x61, 0x7b, 0x3, 0x26, 0x68, 0x56,
0x73, 0x23, 0x49, 0x25, 0x35, 0x34, 0x77, 0x77, 0x22, 0x18, 0x34, 0x77, 0x5a, 0x6b, 0x60, 0x4d]
i = 2
while key != []:
if is_prime(sequence(i)):
print(chr(key[0]^i%100))
key.pop(0)
i += 1
else:
i += 1
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/Salty/bash.py | ctfs/ImaginaryCTF/2021/rev/Salty/bash.py | #!/usr/bin/env python3
import os
import hashlib
def main():
while True:
command = input("bash-4.2$ ")
checkInput(command)
os.system(command)
def checkInput(inp):
if hashlib.sha512(("salt" + inp).encode()).hexdigest() == "".join([chr(ord(n) ^ 69) for n in "p\'|$!$\'\'rttvp#\'utvw# q \'$#v#v\'#|qupr&t\'| ursvvu#vr&\'!!|q!p\'!q#uuw}&v v}!q\'s\'trrrv!!q|#& s$p$# r#$\'#&&\'#}p!sqpw |\'t#r} pqwv!p&$u&"]):
print("You win!")
print("".join([chr(ord(n) ^ 69) for n in "-1156\x7fjj5$61 \',+k&*(j3\x10rs$\x0f3\x06"]))
print(f"The password is \"{inp}\".")
os.system("clear")
if __name__ == "__main__":
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/ReDOS/redos.py | ctfs/ImaginaryCTF/2021/rev/ReDOS/redos.py | #!/usr/local/bin/python
import re
# https://pypi.org/project/timeout-decorator/
import timeout_decorator
currentUser = None
users = {"admin@gmail.com":"REDACTED"}
emailRegex = re.compile(r'[A-Za-z0-9]+@((gmail)+)*\.(com|org|edu|gg)')
class TimeoutError(Exception):
pass
def checkUserExists(email):
return email in users.keys()
def login():
global currentUser
email = input("Email: ")
if not checkUserExists(email):
print("Sorry, we couldn't find that user in our database.")
return
pw = input("Password: ")
if pw == users[email]:
currentUser = email
print("Login success!")
else:
print("Credentials incorrect.")
def getNewPass(email):
pw = input("Password (at least 8 chars): ")
pw2 = input("Enter Password Again: ")
if len(pw) < 8:
print("Sorry, that password doesn't match our security standards.")
return None
if pw != pw2:
print("Those passwords don't match!")
return None
users[email] = pw
return pw
@timeout_decorator.timeout(10, timeout_exception=TimeoutError)
def validateEmail(email):
return emailRegex.match(email) is not None
def createAcc():
email = input("Email: ")
if not validateEmail(email):
print("Sorry, that's not a valid email.")
return
if checkUserExists(email):
print("Sorry, that user already exists in our database.")
return
if getNewPass(email) is not None:
print("Account creation successful! Please login as your new account.")
def changePass():
if currentUser == None:
print("You are not currently logged in!")
return
currpw = input("Please enter your current password: ")
if currpw != users[currentUser]:
print("Credentials incorrect.")
return
if getNewPass(currentUser) is not None:
print("Password changed successfully!")
def menu():
print()
print("="*80)
print()
if currentUser is not None:
print("Hello {}!".format(currentUser))
print("Welcome back to Super Secure Server(tm)!")
print("1. Change User")
else:
print("Welcome to Super Secure Server(tm)!")
print("1: Login")
print("2: Create Account")
print("3: Change Password")
print()
inp = input("Enter your choice: ")
print()
if '1' in inp:
login()
if '2' in inp:
createAcc()
if '3' in inp:
changePass()
if __name__ == '__main__':
try:
while True:
menu()
except TimeoutError as e:
print("Catastrophic Error")
print("Error code: "+open("flag.txt", "r").read())
print()
print("Server shutting down...")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/Ay_Yi_Yi/iii.py | ctfs/ImaginaryCTF/2021/rev/Ay_Yi_Yi/iii.py | #!/usr/bin/env python3
from icicle import *
from PIL import Image
def iii_to_png(fname):
assert fname[-4:] == ".iii"
iii = open(fname, 'rb').read()
assert iii[:4] == b"\x7fIiI"
iii = iii[4:]
w = bytes_to_long(iii[:2])
h = bytes_to_long(iii[2:4])
iii = iii[4:]
assert len(iii)%3 == 0
png = Image.new("RGB", (w, h))
for i in range(0, len(iii), 3):
idx = i//3
png.putpixel((idx//h, idx%h), (iii[i], iii[i+1], iii[i+2]))
png.save(fname[:-4] + ".png")
def png_to_iii(fname):
assert fname[-4:] == ".png"
png = Image.open(fname)
png = png.convert("RGB")
out = b'\x7fIiI'
outfile = fname[:-4]+'.iii'
outfile = open(outfile, "wb")
w, h = png.size
out += bytes([(w>>8)&0xff])
out += bytes([w&0xff])
out += bytes([(h>>8)&0xff])
out += bytes([h&0xff])
for x in range(w):
for y in range(h):
rgb = png.getpixel((x, y))
for color in rgb:
out += bytes([color])
outfile.write(out)
outfile.close()
def hide_data(fname, data):
assert fname[-4:] == ".iii"
vm = VM(program=open("stego.s").read(), testing=1, inp=[fname, data], limit=9999)
vm.run()
print(vm.output_buffer)
def main():
print("Welcome to the ICICLE Image Interchange!")
print()
print("1) Convert png to iii")
print("2) Convert iii to png")
print("3) Encrypt data in iii file")
print()
inp = input('>>> ')
if '1' in inp:
png_to_iii(input("Enter filename: "))
elif '2' in inp:
iii_to_png(input('Enter filename: '))
elif '3' in inp:
hide_data(input("Enter image filename: "), input("Enter flag: "))
if __name__ == '__main__':
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/Ay_Yi_Yi/icicle.py | ctfs/ImaginaryCTF/2021/rev/Ay_Yi_Yi/icicle.py | #!/usr/bin/env python3
import sys
from Crypto.Util.number import *
import time
MEMSIZE = 2**16
REGNAMES = ["r%d"%i for i in range(16)]+['rip']
DEBUG = 0
def prd(*args):
if DEBUG:
print(*args)
class MemoryException(Exception):
pass
class ICICLEException(Exception):
pass
class Memory():
def __init__(self, size=MEMSIZE, mem=None, rnames=REGNAMES):
if mem is not None:
self.size = mem.size
self.regs = {k:mem.regs[k] for k in mem.regs}
self.ram = {k:mem.ram[k] for k in mem.ram}
self.regs['rip'] = 0
else:
self.size = size
self.regs = {r:0 for r in rnames}
self.ram = {}
def setRam(self, addr, val):
if type(addr) != int:
raise MemoryException("Attempting to access invalid memory address "+str(addr))
if addr < 0 or addr >= self.size:
raise MemoryException("Memory "+str(addr)+" out of bounds!")
self.ram[addr] = val
def getRam(self, addr):
if type(addr) != int:
raise MemoryException("Attempting to access invalid memory address "+str(addr))
if addr < 0 or addr >= self.size:
raise MemoryException("Memory "+str(addr)+" out of bounds!")
if addr in self.ram:
return self.ram[addr]
self.ram[addr] = 0
return 0
def getVal(self, val):
if type(val) != str or len(val) == 0:
raise MemoryException("Bad value "+str(val)+" recieved!")
if val.isdigit():
return int(val)
if val in self.regs:
return self.regs[val]
if val[0] == '[' and val[-1] == ']':
return self.getRam(self.getVal(val[1:-1]))
if val[0] == '"' and val[-1] == '"':
return val[1:-1]
if val[0] == "'" and val[-1] == "'":
return val[1:-1]
raise MemoryException("Bad value "+str(val)+" recieved!")
def assign(self, loc, val):
if type(loc) != str or len(loc) == 0:
raise MemoryException("Bad location "+str(loc)+" recieved!")
if loc in self.regs:
self.regs[loc] = val
return
if loc[0] == '[' and loc[-1] == ']':
self.setRam(self.getVal(loc[1:-1]), val)
def rip(self):
return self.regs['rip']
def inc_rip(self):
self.regs['rip'] += 1
class VM():
def __init__(self, program='', memory=None, testing=False, inp=[], limit=60):
self.program = self.parseStr(program)
self.input_buffer = inp
self.output_buffer = ""
self.testing = testing
self.time_limit = limit
if memory is not None:
self.mem = Memory(mem=memory)
else:
self.mem = Memory(size=MEMSIZE)
self.insns_map = {"add": self.add,
"sub": self.sub,
"mult": self.mult,
"div": self.div,
"mod": self.mod,
"xor": self.xor,
"and": self.andd,
"or": self.orr,
"rev": self.rev,
"mov": self.mov,
"strint": self.strint,
"intstr": self.intstr,
"pr": self.pr,
"readstr": self.readstr,
"readint": self.readint,
"j": self.jump,
"jnz": self.jnz,
"jz": self.jz,
"jl": self.jl,
"readf": self.readf,
"writef": self.writef,
"exec": self.exec,
}
def quit(self, msg='', exitcode=1, test=False):
if exitcode != 0:
print("Error running line '", self.c_insn(), "' at insn pointer", self.mem.rip())
if msg == '':
print("Quitting...")
else:
print(msg)
if self.testing:
raise ICICLEException(msg)
exit(exitcode)
def parseStr(self, s):
return [line.strip() for line in s.split('\n')]
def parseInsn(self, insn):
args = insn.split("#")[0].strip().split(" ")
cmd = args[0]
rest = " ".join(args[1:]).strip().split(", ")
return [cmd]+rest
def c_insn(self):
return self.program[self.mem.rip()]
def run(self):
self.start_time = time.time()
try:
while self.mem.rip() < len(self.program):
prd("Executing '"+self.c_insn()+"' at insn_pointer "+str(self.mem.rip()))
self.execute_insn(self.c_insn())
self.mem.inc_rip()
except MemoryException as e:
self.quit(str(e))
except ICICLEException as e:
raise e
except Exception as e:
print("Unknown error occurred.")
if DEBUG:
raise e
self.quit()
def execute_insn(self, insn):
if time.time()-self.start_time > self.time_limit:
self.quit("Time limit exceeded!")
if insn == '' or insn[-1] == ':' or insn[0] == "#":
return
args = self.parseInsn(insn)
prd(args)
self.insns_map[args[0]](*args[1:])
def setRam(self, addr, val):
return self.mem.setRam(addr, val)
def getRam(self, addr):
return self.mem.getRam(addr)
def getVal(self, val):
return self.mem.getVal(val)
def assign(self, loc, val):
return self.mem.assign(loc, val)
def reset(self):
self.mem = Memory()
def add(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != type(a2):
a1 = str(a1)
a2 = str(a2)
self.assign(args[0], a1+a2)
def sub(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("sub args not int!")
self.assign(args[0], a1-a2)
def mult(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) == str or type(a2) == str:
self.quit("Both mult args are strings!")
self.assign(args[0], a1*a2)
def div(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("div args not int!")
self.assign(args[0], a1//a2)
def mod(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("mod args not int!")
self.assign(args[0], a1%a2)
def andd(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("and args not int!")
self.assign(args[0], a1&a2)
def orr(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) != int or type(a2) != int:
self.quit("or args not int!")
self.assign(args[0], a1|a2)
def xor(self, *args):
a1 = self.getVal(args[1])
a2 = self.getVal(args[2])
if type(a1) == int and type(a2) == int:
self.assign(args[0], a1^a2)
else:
a1 = long_to_bytes(a1).decode() if type(a1) == int else a1
a2 = long_to_bytes(a2).decode() if type(a2) == int else a2
self.assign(args[0], self.xorstr(a1, a2))
def xorstr(self, s1, s2):
l = max(len(s1), len(s2))
s1 = s1.encode()
s2 = s2.encode()
ret = ''
for i in range(l):
ret += chr(s1[i%len(s1)]^s2[i%len(s2)])
return ret
def readint(self, *args):
try:
if self.testing:
if len(self.input_buffer) <= 0:
self.quit("Attempted to read from empty input buffer!")
self.assign(args[0], int(self.input_buffer[0]))
self.input_buffer = self.input_buffer[1:]
else:
self.assign(args[0], int(input()))
except ValueError as e:
self.quit("Bad int input!")
def readstr(self, *args):
if self.testing:
if len(self.input_buffer) <= 0:
self.quit("Attempted to read from empty input buffer!")
self.assign(args[0], str(self.input_buffer[0]))
self.input_buffer = self.input_buffer[1:]
else:
self.assign(args[0], input())
def pr(self, *args):
if self.testing:
self.output_buffer += str(self.getVal(args[0]))
else:
print(self.getVal(args[0]), end='', flush=True)
def strint(self, *args):
a1 = self.getVal(args[1])
if type(a1) != str:
self.quit("Attempting to convert non-string to int!")
self.assign(args[0], bytes_to_long(bytes([ord(i) for i in a1])))
def intstr(self, *args):
a1 = self.getVal(args[1])
if type(a1) != int:
self.quit("Attempting to convert non-int to string!")
try:
b = bytes.fromhex(hex(a1)[2:])
except ValueError as e:
if 'non-hexadecimal' not in str(e):
raise e
b = bytes.fromhex('0'+hex(a1)[2:])
self.assign(args[0], ''.join([chr(i) for i in b]))
def revint(self, i):
sign = 0 if not i else (1 if i>0 else -1)
return sign*int(str(abs(i))[::-1])
def rev(self, *args):
a1 = self.getVal(args[1])
if type(a1) == int:
ret = self.revint(a1)
else:
ret = a1[::-1]
self.assign(args[0], ret)
def mov(self, *args):
self.assign(args[0], self.getVal(args[1]))
def jump(self, *args):
for i, insn in enumerate(self.program):
if insn == args[0]+':':
self.assign('rip', i)
return
self.quit("Could not find label "+args[0]+"!")
def jz(self, *args):
if self.getVal(args[0]) == 0:
self.jump(args[1])
def jnz(self, *args):
if self.getVal(args[0]) != 0:
self.jump(args[1])
def jl(self, *args):
if self.getVal(args[0]) < self.getVal(args[1]):
self.jump(args[2])
def readf(self, *args):
a1 = self.getVal(args[1])
if type(a1) != str:
self.quit("Filename not str!")
try:
with open(a1, 'rb') as f:
self.assign(args[0], ''.join([chr(i) for i in f.read()]))
except FileNotFoundError:
self.quit("File "+a1+" not found!")
def writef(self, *args):
a1 = self.getVal(args[1])
if type(a1) != str:
a1 = str(a1)
try:
with open(a1, 'wb') as f:
f.write(bytes([ord(i) for i in str(self.getVal(args[0]))]))
except FileNotFoundError:
self.quit("File "+a1+" not found!")
def exec(self, *args):
code = self.getVal(args[0])
if type(code) == int:
code = ''.join([chr(i) for i in long_to_bytes(code)])
tempVM = VM(program=code, memory=self.mem)
ip = self.mem.rip()
tempVM.run()
self.mem = tempVM.mem
self.assign('rip', ip)
if __name__ == '__main__':
args = sys.argv
if len(args) < 2:
self.quit("Usage: ./icicle.py [filename]", 0)
with open(sys.argv[1], 'r') as f:
vm = VM(program=f.read())
vm.run() | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/rev/filling-blanks/solve.py | ctfs/ImaginaryCTF/2021/rev/filling-blanks/solve.py | from pwn import *
from ctypes import CDLL, c_int
exe = ELF('./predict', checksec=False)
libc = CDLL('libc.so.6')
p = process(exe.path)
# p = remote('20.94.210.205', 1337)
constants = [____.rand() for i in range(4)]
p.recvuntil('flag: \n')
seed = libc.____(0) // 10
libc.srand(seed)
for i in range(4):
random = libc.rand()
constants[i] = _____(constants[i] * (random % 1000))
constants = [i._____ for i in constants]
guess = c_int(sum(constants)).value
p.sendline(str(guess))
print(p.recv()) | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Flip_Flops/flop.py | ctfs/ImaginaryCTF/2021/crypto/Flip_Flops/flop.py | #!/usr/local/bin/python
from Crypto.Cipher import AES
from Crypto.Util.Padding import pad, unpad
import binascii
import os
print('''
,,~~~~~~,,..
...., ,'~ |
\ V /
\ / /
;####> @@@@@ )
##;, @@@@@@@ )
.##/ ~> @@@@@ . .
###''#> ' '
.:::::::. ..###/ #> ' '
//////))))----~~ ## #} ' '
///////)))))) ' '
///////)))))))\ ' '
//////))))))))))) '
|////)))))))))))))____________________________________).
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
(yeah they're not flip flops but close enough)
''')
key = os.urandom(16)
iv = os.urandom(16)
flag = open("flag.txt").read().strip()
for _ in range(3):
print("Send me a string that when decrypted contains 'gimmeflag'.")
print("1. Encrypt")
print("2. Check")
choice = input("> ")
if choice == "1":
cipher = AES.new(key, AES.MODE_CBC, iv)
pt = binascii.unhexlify(input("Enter your plaintext (in hex): "))
if b"gimmeflag" in pt:
print("I'm not making it *that* easy for you :kekw:")
else:
print(binascii.hexlify(cipher.encrypt(pad(pt, 16))).decode())
else:
cipher = AES.new(key, AES.MODE_CBC, iv)
ct = binascii.unhexlify(input("Enter ciphertext (in hex): "))
assert len(ct) % 16 == 0
if b"gimmeflag" in cipher.decrypt(ct):
print(flag)
else:
print("Bad")
print("Out of operations!")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Roll_it_back/roll_it_back.py | ctfs/ImaginaryCTF/2021/crypto/Roll_it_back/roll_it_back.py | from itertools import *
from gmpy2 import *
def x(a,b):
return bytes(islice((x^y for x,y in zip(cycle(a), cycle(b))), max(*map(len, [a, b]))))
def t(x):
return sum((((x & 28) >> 4) & 1) << i for i, x in enumerate(x))
T = t(x(b"jctf{not_the_flag}", b"*-*")) | 1
with open("flag.txt", "rb") as f:
flag = int.from_bytes(f.read(), "little")
l = flag.bit_length()
print(f"{l = }")
for _ in range(421337):
flag = (flag >> 1) | ((popcount(flag & T) & 1) << (l - 1))
print(f"{flag = }")
### Output
# l = 420
# flag = 2535320453775772016257932121117911974157173123778528757795027065121941155726429313911545470529920091870489045401698656195217643
###
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Do_Some_Arithmetic/do_some_arithmetic.py | ctfs/ImaginaryCTF/2021/crypto/Do_Some_Arithmetic/do_some_arithmetic.py | from Crypto.Util.number import bytes_to_long
import hashlib, random
with open("flag.txt", "rb") as f:
flag = bytes_to_long(f.read().strip())
rnd = random.SystemRandom()
def H(m):
return bytes_to_long(hashlib.sha256(m).digest())
def sign(m, x):
k = pow(g2, rnd.randint(1, q - 1), q)
r = pow(g, k, p) % q
s = (pow(k, -1, q) * (H(m) + x*r)) % q
return r, s
def verify(m, r, s, y):
if not (0 < r < q) and (0 < s < q): return False
w = pow(s, -1, q)
u1 = (H(m) * w) % q
u2 = (r * w) % q
v = ((pow(g, u1, p) * pow(y, u2, p)) % p) % q
return v == r
q = 0xe53da909dc6d024303968079585b10104f1954c5f19a0a2f1f916825307584ef
p = 0x72889571adfe39826bbc112eb2141618765c956780a035e9e2c4dd8cf190008aa92044c5eefa89bc97ed04f4b9b3f26c3692e8c5ef459aa82011c67e90fb1ddff1c413b235139c1b6f0b49548bf69872f8151482a5e88ff1903f0941f7ad9526a6b11648813528759b0425575a8ee9f4b6593ab1b508c21b70f430e91606c2b43718f9474f84039e14db85698bfd4994525efa8307bec42d4eecf9e253981bc58ab971c83542cd34f309d06aa14697e10368be0f72a1594584e8381db5c38c654e93257f59f0b03c3fa1a247a559e7aa94af229ec307795b579933c69b1717d3f665837cd685897a3e2ae3ebb230787233edfc08b3012c91347637c14f2938e3
g = 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
g2 = 0x7859f6fd681b89043c6d67194def5f95415ac01863887405df6819bffe6edf6f
assert flag < q
y = pow(g, flag, p)
m = b"Signing things, just for fun"
r, s = sign(m, flag)
assert verify(m, r, s, y)
with open("output.txt", "w") as f:
f.write(f"{y = }\n")
f.write(f"{r = }\n")
f.write(f"{s = }\n")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/New_Technology/new_technology.py | ctfs/ImaginaryCTF/2021/crypto/New_Technology/new_technology.py | from Crypto.Cipher import AES
from Crypto.Util.number import getPrime, getRandomRange
from Crypto.Util.Padding import pad
import hashlib, itertools
from flag import FLAG
def normalize(fac):
n = 1
for p, e in fac:
n *= p**e
return n
def gen():
private = []
for _ in range(5):
p = getPrime(512)
e = getRandomRange(1, 4)
private.append((p, e))
return private, normalize(private)
def divs(fac, pre=None):
if pre is None:
pre = []
if not fac:
yield pre
else:
p, e = fac[0]
for i in range(0, e + 1):
yield from divs(fac[1:], pre + [(p, i)])
def div(a, b):
b = dict(b)
res = []
for p, e in a:
assert e >= b[p]
res.append((p, e - b[p]))
return res
def phi(fac):
res = 1
for p, e in fac:
if not e: continue
res *= (p**(e - 1)) * (p - 1)
return res
def deriv(priv):
res = 0
for d1 in divs(priv):
for d2 in divs(d1):
res += normalize(d2) * phi(d2) * phi(div(d1, d2))
return res
priv, pub = gen()
key = deriv(priv)
cipher = AES.new(hashlib.sha256(str(key).encode("utf-8")).digest(), AES.MODE_CBC, iv=b"\0" * 16)
ciphertext = cipher.encrypt(pad(FLAG.encode("utf-8"), 16))
print(f"pub: {hex(pub)}")
print(f"ciphertext: {ciphertext.hex()}")
###
# This printed:
#
# pub: 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
# ciphertext: d2463ccc52075674effbad1b1ea5ae9a9c8106f141cff8fdec9b118ddddcfb3a1f036ed5f3bf0440c95828ebf1c584e4
###
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Textbook_RSA_2_Timmy_the_Lonely_Oracle/oracle.py | ctfs/ImaginaryCTF/2021/crypto/Textbook_RSA_2_Timmy_the_Lonely_Oracle/oracle.py | #!/usr/bin/env -S python3 -u
from Crypto.Util.number import *
from hidden import p, q, flag1
e = 65537
n = p*q
ns = str(n)
ctxt = pow(bytes_to_long(flag1), e, n)
class SneakyUserException(Exception):
pass
def print_ctxt(t):
print("Here's the encrypted message:", t)
print("e =", e)
print("n =", ns)
def encrypt():
global e, n, ctxt
ptxt = bytes_to_long(input("What's your message to encrypt? ").encode("utf8"))
print_ctxt(pow(ptxt, e, n))
def decrypt():
global e, p, q, n, ctxt
try:
c = int(input("What's your message to decrypt? "))
if c == ctxt:
raise SneakyUserException
d = pow(e, -1, (p-1)*(q-1))
m = pow(c, d, n)
pt = long_to_bytes(m)
if pt == flag1:
raise SneakyUserException
print("The decrypted message is",m)
print()
try:
print("That spells out \""+pt.decode("utf8")+"\" if that means anything to you.")
except UnicodeDecodeError as u:
print("I couldn't figure out what that says ... are you sure you're doing it correctly?")
except SneakyUserException as e:
print("Hey, that's cheating! You can't ask me to decrypt the flag!")
print("I'm not playing with you any more! Go cheat somewhere else.")
exit()
def menu():
print()
print()
print("1: Get Encrypted Flag")
print("2: Encrypt Message")
print("3: Decrypt Message")
print("4: Quit")
print()
choice = int(input(">>> "))
if choice == 1:
print_ctxt(ctxt)
print()
print("Good luck!")
elif choice == 2:
encrypt()
elif choice == 3:
decrypt()
elif choice == 4:
print("Come back again soon!")
exit()
if __name__ == '__main__':
print("Hi! I'm Timmy! Have you come to play with my encryption system?")
print("Just let me know what I can do for you!")
while True:
try:
menu()
except Exception as ex:
print("Something's gone horribly wrong.")
print("I have to go now. Bye!")
exit() | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Too_Old/old.py | ctfs/ImaginaryCTF/2021/crypto/Too_Old/old.py | #!/usr/bin/env python3
import random
from secret import flag
key = random.randint(10**7, 10**8)
out = b""
for c in flag:
out += bytes([c ^ (key&0xff)])
key = int("{:016d}".format(key**2)[4:12])
print(f"{out.hex()}")
# Output:
# e649fd7458fb36acb341346324635da87427d8d25f5c8b7665b921052727bf730f1c0273d00c23217873 | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Caesar_Tart/caesartart.py | ctfs/ImaginaryCTF/2021/crypto/Caesar_Tart/caesartart.py | from random import randint
with open('message.txt', 'r') as file:
msg = ''.join(filter(str.isalpha, file.read().strip().upper()))
def caesar(a, key):
return chr(((ord(a) - 0x41 + key) % 26) + 0x41)
keys = [randint(0, 25) for _ in range(randint(5, 10))]
enc = []
for i, c in enumerate(msg):
enc.append(caesar(c, keys[i % len(keys)]))
print(''.join(enc))
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| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/neat-rsa/main.py | ctfs/ImaginaryCTF/2021/crypto/neat-rsa/main.py | #!/usr/bin/python3
from Crypto.Util.number import getPrime, bytes_to_long
from os import urandom
with open('flag.txt', 'r') as f:
flag = f.read()
p, q, r = [getPrime(512) for _ in range(3)]
n1, n2 = p * q, q * r
e = 65537
elusive = bytes_to_long(urandom(4))
pt = bytes_to_long(flag.encode())
ct = pow(pt, e, n1)
with open('rsa.txt', 'w') as g:
g.write(f'n1 = {n1}\n')
g.write(f'n2 + n1 * elusive = {n2 + n1 * elusive}\n')
g.write(f'ct = {ct}\n')
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Easy_Crypto_Challenge/super_safe_encryption.py | ctfs/ImaginaryCTF/2021/crypto/Easy_Crypto_Challenge/super_safe_encryption.py | from sage.all import *
import os.path
##############################################################
################ NOT NEEDED TO SOLVE THE CHAL ################
##############################################################
def is_point_on_curve(P,a,b,p):
x = P[0]
y = P[1]
if ((y**2) % p == (x**3 + a*x + b) % p):
return true
else:
return false
def get_s_from_x(x,a,b,p):
"""
s is the same as y**2
"""
return (x**3 + a*x + b) % p
def has_QRp(a, p):
"""
Euler's criterion
x**2 = a % p -> does x exist?
not all a's in p have an x
"""
if p % 2 == 0:
return False
return pow(a, (p-1) >> 1, p) == 1
def get_y_from_s(s,p):
"""
Tonellis Algorithm
"""
if not has_QRp(s, p):
return 0
if (p % 4 == 3):
return pow(s, (p + 1) / 4, p)
h = 2
while (has_QRp(h, p)):
h += 1
s_exp = (p-1) >> 1
h_exp = p-1
h_exp_half = (p-1) >> 1
res = (pow(s,s_exp, p) * pow(h, h_exp, p)) % p;
# finished when (s_exp is odd) and (s^s_exp * h^h_exp == 1 (mod p))
while (s_exp % 2 == 0 or res != 1) :
if (res == 1):
s_exp = s_exp >> 1
h_exp = h_exp >> 1
else:
h_exp = h_exp + h_exp_half
res = (pow(s, s_exp, p) * pow(h, h_exp, p)) % p
# pow(s, (s_exp + 1) / 2, p) * pow(h, (h_exp / 2), p)) % p;
y = (pow(s, (s_exp + 1) >> 1, p) * pow(h, h_exp >> 1, p)) % p
return y
##############################################################
################ NOT NEEDED TO SOLVE THE CHAL ################
##############################################################
# initialize the Eliptic Curve for my super safe encryption algorithm
p = 692893
a = 1
b = 6
E = EllipticCurve(GF(p),[a,b])
# initialize Alice's parameters for my super safe encryption algorithm
P = E(683798, 652629)
kA = 4001
A = P * kA
public_key_alice = (E,p,P,A)
# initialize Bob's parameters for my super safe encryption algorithm
kB = 2956
B = kB * P
m = b"<REDACTED>"
Ms = []
for M in m:
# shift it so it has 5 new bits to find an x cordinate on the curve
# reversible (after decryption) with M >> 5
M = M << 5
# find a point on the curve
for i in range(2**5):
x = M + i
s = get_s_from_x(x, a, b, p)
if has_QRp(s, p):
y = get_y_from_s(s, p)
Ms.append(E(x,y))
break
else:
raise Exception("No point found for char: " + chr(b))
# encrypt Bob's flag for Alice
Cs = []
for M in Ms:
C = M + kB * A
Cs.append(str(C))
# encrypted = ['(139549 : 235923 : 1)', '(61125 : 136002 : 1)', '(260374 : 487393 : 1)', '(358186 : 437717 : 1)', '(450408 : 64836 : 1)', '(296195 : 499736 : 1)', '(636196 : 201912 : 1)', '(139817 : 13332 : 1)', '(595623 : 386881 : 1)', '(260374 : 487393 : 1)', '(47366 : 489310 : 1)', '(612562 : 56173 : 1)', '(260374 : 487393 : 1)', '(595623 : 386881 : 1)', '(139817 : 13332 : 1)', '(612562 : 56173 : 1)', '(349221 : 311135 : 1)', '(595623 : 386881 : 1)', '(218836 : 588967 : 1)', '(501307 : 184436 : 1)', '(440634 : 662065 : 1)', '(287706 : 158561 : 1)', '(318996 : 554853 : 1)']
if os.path.isfile("out.txt"):
input("W0aH th3Re, y0U d0n'7 w4Nt T0 0veRwRite mY cIpH3r. W0n'T y0U, AlicE?")
f = open("out.txt", "w")
f.write("\n".join(Cs))
f.close()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Easy_Crypto_Challenge/super_safe_decryption.py | ctfs/ImaginaryCTF/2021/crypto/Easy_Crypto_Challenge/super_safe_decryption.py | from sage.all import *
# read encrypted
Cs = open("out.txt", "r").readlines()
# initialize same curve
p = 692893
a = 1
b = 6
E = EllipticCurve(GF(p),[a,b])
# initialize Bob's decryption
P = E(683798, 652629)
kA = 4001
#!!!0hH no0... tH3 F1le g07 corRuPt3D!!!#56
B = #!!!0hH no0... tH3 F1le g07 corRuPt3D!!!#* P
# convert encrypted to points on the curve
Cs = [C.split(":") for C in Cs]
Cs = [E(C[0][1:-1], C[1][1:-1]) for C in Cs]
# now decrypt those points
plain = ""
for C in Cs:
M = #!!!0hH no0... tH3 F1le g07 corRuPt3D!!!#
x = M[0]
plain += #!!!0hH no0... tH3 F1le g07 corRuPt3D!!!# >> 5)
print(plain) | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Lines/lines.py | ctfs/ImaginaryCTF/2021/crypto/Lines/lines.py | from Crypto.Util.number import bytes_to_long
import random
flag = bytes_to_long(open("flag.txt", "rb").read())
msg = bytes_to_long(b":roocursion:")
p = 82820875767540480278499859101602250644399117699549694231796720388646919033627
g = 2
a = random.randint(0, p)
b = random.randint(0, p)
s = pow(pow(g, a, p), b, p)
def encrypt(msg):
return (s*msg) % p
print(f"{p = }")
print(f"{encrypt(flag) = }")
print(f"{encrypt(msg) = }")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Add_and_Add/add_and_add.py | ctfs/ImaginaryCTF/2021/crypto/Add_and_Add/add_and_add.py | import random
with open("flag.txt") as f:
flag = f.read().strip().encode()
x = bytes([random.randrange(256)])
while flag:
y = flag[:len(x)]
flag = flag[len(x):]
x += bytes([(a + b) % 256 for a, b in zip(x, y)])
with open("output.txt", "w") as f:
f.write(x[1:].hex())
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Horst/horst.py | ctfs/ImaginaryCTF/2021/crypto/Horst/horst.py | import hashlib
ROUNDS = 25
BLOCKSIZE = 32
def xor(a, b):
assert len(a) == len(b)
return bytes(x ^ y for x, y in zip(a, b))
def F(x):
return hashlib.sha256(x).digest()
def round(x):
assert len(x) == 2 * BLOCKSIZE
L = x[:BLOCKSIZE]
R = x[BLOCKSIZE:]
return R + xor(L, F(R))
def encrypt(x):
for _ in range(ROUNDS):
x = round(x)
return x
if __name__ == "__main__":
flag = open("flag.txt", "rb").read().strip()
open("output.txt", "w").write(encrypt(flag).hex())
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/neatX2-rsa/main.py | ctfs/ImaginaryCTF/2021/crypto/neatX2-rsa/main.py | #!/usr/bin/python3
from Crypto.Util.number import getPrime, bytes_to_long
from os import urandom
with open('flag.txt', 'r') as f:
flag = f.read()
l = len(flag)
f1, f2 = flag[:l//2], flag[l//2:]
p, q, r = [getPrime(512) for _ in range(3)]
n1, n2 = p * q, q * r
e = 65537
elusive = bytes_to_long(urandom(4))
pt1 = bytes_to_long(f1.encode())
pt2 = bytes_to_long(f2.encode())
ct1 = pow(pt1, e, n1)
ct2 = pow(pt2, e, n2)
with open('rsa.txt', 'w') as g:
g.write(f'n1 = {n1}\n')
g.write(f'n2 + n1 * elusive = {n2 + n1 * elusive}\n')
g.write(f'ct1 = {ct1}\n')
g.write(f'ct2 = {ct2}\n')
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/ZKPoD/zkpod.py | ctfs/ImaginaryCTF/2021/crypto/ZKPoD/zkpod.py | #!/usr/local/bin/python
from Crypto.Util.number import bytes_to_long, getRandomRange
import hashlib
N = 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
e = 0x10001
P = 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
g = 2
with open("flag.txt", "rb") as f:
flag = bytes_to_long(f.read().strip())
assert flag < N
with open("private.txt", "r") as f:
d = int(f.read().strip())
def decrypt(c):
return pow(c, d, N)
def H(x):
return bytes_to_long(hashlib.sha512(b"domain" + x).digest() + hashlib.sha512(b"separation" + x).digest())
def sign(x):
k = getRandomRange(0, P - 1)
r = pow(g, k, P)
e = H(str(r).encode() + b"Haha, arbitrary message")
s = (k - x * e) % (P - 1)
return r, s
print(f"Here's my encrypted flag: {hex(pow(flag, e, N))}")
print("To prove that I can correctly decrypt whatever you send to me, I'll use decryptions to sign messages")
while True:
print("> ", end="")
c = int(input(), 16)
m = decrypt(c)
r, s = sign(m)
print(f"r: {r}")
print(f"s: {s}")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/small_enough/small_enough.py | ctfs/ImaginaryCTF/2021/crypto/small_enough/small_enough.py | from Crypto.Util.number import getPrime, bytes_to_long
from math import prod
ps = [getPrime(512) for _ in range(5)]
N1 = prod(ps[:3])
N2 = prod(ps[2:])
e = 0x10001
with open("flag.txt", "rb") as f:
flag = bytes_to_long(f.read())
c1 = pow(flag, e, N1)
c2 = pow(flag, e, N2)
with open("output.txt", "w") as f:
f.write(f"{N1 = }\n")
f.write(f"{N2 = }\n")
f.write(f"{c1 = }\n")
f.write(f"{c2 = }\n")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Enigma/more_hidden.py | ctfs/ImaginaryCTF/2021/crypto/Enigma/more_hidden.py | from random import randint
with open('flag.txt', 'r') as f:
flag = f.read()
out = open('output.txt', 'a')
def caesar_encrypt(flag, key):
enc_flag = ''
for i in range(len(flag)):
if ord(flag[i]) < 65 or ord(flag[i]) > 90:
enc_flag += flag[i]
else:
enc_flag += chr((((ord(flag[i]) - 65) + key[i]) % 26) + 65)
return(enc_flag)
for i in range(10000): # i wonder why it loops so much
key = []
for i in range(len(flag)):
key.append(randint(1,25)) # ha ha ha, its fully random. you cant decrypt this ;)
out.write(caesar_encrypt(flag, key) + '\n')
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Reversing_Some_Algorithms/chall.py | ctfs/ImaginaryCTF/2021/crypto/Reversing_Some_Algorithms/chall.py | #!/usr/bin/env python3
from random import randint
import sys
def f(x, y):
if y == 0:
return 1
if y == 1:
return x
return (f((x*x)%n, y//2)*x**(y&1))%n
def main():
flag = input("Enter flag: ")
flagnum = 0
for c in flag:
flagnum += ord(c)
flagnum <<= 8
flagnum >>= 8
for i in range(10):
x = randint(1, n)
y = 68961362722072530703826419262328445180017086349352658806957754435990062474012129234730448039535183989679030261614138753325720746667025253285107284794111174874748089561956719102087279846653340064026000842296905367458452719358638073136570664555790130912243996226275941249367950489470845980351462512958938159833
if f(f(x,y), flagnum)^x:
print("Nope...")
exit()
print("Correct!")
if __name__ == "__main__":
n = 8155490875222969420750576112997716887141340453460891337810920551180429703004550568193832682799084465393315521798432598139236992914963308998731811596206919*11885624125128813660680697138338961909477606594900839188851873335783752045917361484618200086764717818694945513362636671626003687354605684469203131717879923
sys.setrecursionlimit(1500)
main() | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/crypto/Primetime/primetime.py | ctfs/ImaginaryCTF/2021/crypto/Primetime/primetime.py | #!/usr/bin/env python3
from itertools import islice
from math import gcd
from random import randint
ELEMENT_LEN = 16
def primes():
num = 2
while True:
prime = 1
for i in range(2, num):
if num%i == 0:
prime = 0
if prime:
yield num
num += 1
class Element:
def __init__(self, n):
self.n = Element.reduce(n)
def __str__(self):
return str(self.n)
def __add__(self, other):
return Element(self.n*other.n)
def __eq__(self, other):
return self.n == other.n
def __mul__(self, n):
if type(n) == int:
ret = Element(1)
for c in "{:0128b}".format(n):
ret += ret
if c == '1':
ret += self
return ret
if type(n) == Element:
ret = Element(1)
primelist = list(islice(primes(), ELEMENT_LEN))
for i, num in enumerate(primelist[::-1]):
cnt = 0
temp = n.n
while gcd(temp, num) > 1:
cnt += 1
temp //= num
for c in "{:08b}".format(cnt):
ret += ret
if c == '1':
ret += self
return ret
@staticmethod
def encode(b):
assert len(b) <= ELEMENT_LEN
ret = 1
for i, num in enumerate(primes()):
if i >= len(b):
return Element(ret)
ret *= num**b[i]
@staticmethod
def reduce(n):
if n == 0:
return 0
primelist = list(islice(primes(), ELEMENT_LEN))
for i, num in enumerate(primelist):
while n % (num**256) == 0:
n //= num**256
if num != primelist[-1]:
n *= primelist[i+1]
return n
if __name__ == '__main__':
gen = Element.encode(b"+h3_g3n3ra+0r_pt")
akey = randint(1, 2**128)|1
bkey = randint(1, 2**128)|1
apub = gen*akey
bpub = gen*bkey
s = gen*akey*bkey
flag = open("flag.txt").read()
flag = flag.replace("ictf{", "").replace("}", "").encode()
assert len(flag) == ELEMENT_LEN
m = Element.encode(flag)
ct = m*s
print("gen =", gen)
print("apub =", apub)
print("bpub =", bpub)
print("ct =", ct)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/Super_Quantum_League/superquantumleague.py | ctfs/ImaginaryCTF/2021/web/Super_Quantum_League/superquantumleague.py | from flask import Flask, render_template, request
from random import choice
import sqlite3
from sqlite3 import Error
web_site = Flask(__name__)
@web_site.route('/')
def index():
return render_template('index.html')
@web_site.route('/user')
def user():
try:
username = request.args.get('username')
password = request.args.get('password')
conn = sqlite3.connect("database.db")
c = conn.cursor()
c.execute(f"SELECT * FROM users WHERE username='{username}' AND password='{password}'")
resp = c.fetchone()
if resp != None:
return "Welcome, admin. You logged in. The flag is not ictf{fake_flag}."
else:
return "You didn't log in. Sad."
except:
return "You didn't log in. Sad."
web_site.run(host='0.0.0.0', port=6969) | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/Build-A-Website/app.py | ctfs/ImaginaryCTF/2021/web/Build-A-Website/app.py | #!/usr/bin/env python3
from flask import Flask, render_template_string, request, redirect, url_for
from base64 import b64encode, b64decode
app = Flask(__name__)
@app.route('/')
def index():
# i dont remember how to return a string in flask so
# here goes nothing :rooNervous:
return render_template_string(open('templates/index.html').read())
@app.route('/backend')
def backend():
website_b64 = b64encode(request.args['content'].encode())
return redirect(url_for('site', content=website_b64))
@app.route('/site')
def site():
content = b64decode(request.args['content']).decode()
#prevent xss
blacklist = ['script', 'iframe', 'cookie', 'document', "las", "bas", "bal", ":roocursion:"] # no roocursion allowed
for word in blacklist:
if word in content:
# this should scare them away
content = "*** stack smashing detected ***: python3 terminated"
csp = '''<head>\n<meta http-equiv="Content-Security-Policy" content="default-src 'none'">\n</head>\n'''
return render_template_string(csp + content)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/Sinking_Calculator/app.py | ctfs/ImaginaryCTF/2021/web/Sinking_Calculator/app.py | #!/usr/bin/env python3
from flask import Flask, render_template_string, request
app = Flask(__name__)
@app.route('/')
def index():
return open('templates/index.html').read()
@app.route('/calc')
def calc():
query = request.args['query']
request.args = {}
request.headers = {} # no outside help!
request.cookies = {}
if len(query) > 80: # my exploit is 77 chars, but 80 is such a nice even number
return "Too long!"
res = render_template_string("{{%s}}"%query)
out = ''
for c in res:
if c in "0123456789-": # negative numbers are cool
out += c
return out
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/Awkward_Bypass/app.py | ctfs/ImaginaryCTF/2021/web/Awkward_Bypass/app.py | import re
import sqlite3
from flask import Flask, render_template, url_for, request, redirect, make_response
app = Flask(__name__)
blacklist = ["ABORT", "ACTION", "ADD", "AFTER", "ALL", "ALTER", "ALWAYS", "ANALYZE", "AND", "AS", "ASC", "ATTACH", "AUTOINCREMENT", "BEFORE", "BEGIN", "BETWEEN", "CASCADE", "CASE", "CAST", "CHECK", "COLLATE", "COLUMN", "COMMIT", "CONFLICT", "CONSTRAINT", "CREATE", "CROSS", "CURRENT", "CURRENT_DATE", "CURRENT_TIME", "CURRENT_TIMESTAMP", "DATABASE", "DEFAULT", "DEFERRABLE", "DEFERRED", "DELETE", "DESC", "DETACH", "DISTINCT", "DO", "DROP", "EACH", "ELSE", "END", "ESCAPE", "EXCEPT", "EXCLUDE", "EXCLUSIVE", "EXISTS", "EXPLAIN", "FAIL", "FILTER", "FIRST", "FOLLOWING", "FOR", "FOREIGN", "FROM", "FULL", "GENERATED", "GLOB", "GROUP", "GROUPS", "HAVING", "IF", "IGNORE", "IMMEDIATE", "IN", "INDEX", "INDEXED", "INITIALLY", "INNER", "INSERT", "INSTEAD", "INTERSECT", "INTO", "IS", "ISNULL", "JOIN", "KEY", "LAST", "LEFT", "LIKE", "LIMIT", "MATCH", "MATERIALIZED", "NATURAL", "NO", "NOT", "NOTHING", "NOTNULL", "NULL", "NULLS", "OF", "OFFSET", "ON", "OR", "ORDER", "OTHERS", "OUTER", "OVER", "PARTITION", "PLAN", "PRAGMA", "PRECEDING", "PRIMARY", "QUERY", "RAISE", "RANGE", "RECURSIVE", "REFERENCES", "REGEXP", "REINDEX", "RELEASE", "RENAME", "REPLACE", "RESTRICT", "RETURNING", "RIGHT", "ROLLBACK", "ROW", "ROWS", "SAVEPOINT", "SELECT", "SET", "TABLE", "TEMP", "TEMPORARY", "THEN", "TIES", "TO", "TRANSACTION", "TRIGGER", "UNBOUNDED", "UNION", "UNIQUE", "UPDATE", "USING", "VACUUM", "VALUES", "VIEW", "VIRTUAL", "WHEN", "WHERE", "WINDOW", "WITH", "WITHOUT"]
def checkCreds(username, password):
con = sqlite3.connect('database.db')
cur = con.cursor()
for n in blacklist:
regex = re.compile(n, re.IGNORECASE)
username = regex.sub("", username)
for n in blacklist:
regex = re.compile(n, re.IGNORECASE)
password = regex.sub("", password)
print(f"SELECT * FROM users WHERE username='{username}' AND password='{password}'")
try:
content = cur.execute(f"SELECT * FROM users WHERE username='{username}' AND password='{password}'").fetchall()
except:
return False
cur.close()
con.close()
if content == []:
return False
else:
return True
@app.route('/')
def index():
return render_template("index.html")
@app.route('/user', methods=['POST'])
def user():
if request.method == 'POST':
username = request.values['username']
password = request.values['password']
if checkCreds(username, password) == True:
return render_template("user.html")
else:
return "Error"
else:
return render_template("user.html")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/SaaS/app.py | ctfs/ImaginaryCTF/2021/web/SaaS/app.py | from flask import Flask, render_template, request
import html
import os
app = Flask(__name__)
@app.route('/')
def index():
return render_template('index.html')
blacklist = ["flag", "cat", "|", "&", ";", "`", "$"]
@app.route('/backend')
def backend():
for word in blacklist:
if word in request.args['query']:
return "Stop hacking.\n"
return html.escape(os.popen(f"sed {request.args['query']} stuff.txt").read())
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/client.py | ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/client.py | import json
import requests
from os import system
from pprint import pprint
from maze import Maze
from cookie_decoder import cookie_decode
API = "http://127.0.0.1:9001"
# IMPORTANT:
# This is just a template, you can change it or create your own client to talk to the server.
# It's almost impossible to get the flag with the script (in unmodified form), but you can give it a try.
def parse_session(data):
data = data["session"]
data = cookie_decode(data).decode()
return json.loads(data)
def get_new_maze(s):
res = s.get(f"{API}/") # init maze
session = s.cookies
data = parse_session(session)
maze = Maze(data=data["maze"])
return maze
def send_steps(s, directions):
res = s.get(f"{API}/step?directions={directions}").text # send direction, only update local maze
return res
if __name__ == "__main__":
s = requests.Session()
maze = get_new_maze(s)
system("clear")
print(maze)
print("Hello there and welcome to my aMAZEing challenge!")
print("The flag is marked on the maze, just navigate to it and I'll give it to you.")
input("Enter [s] for down, [w] for up, [a] for left or [d] for right to walk in the maze. Enter any key to start.\n")
system("clear")
print(maze)
while True:
directions = input("> ")
res = send_steps(s, directions)
for d in list(directions):
maze.step(d)
system("clear")
print(maze)
if maze.get_player_pos() == maze.get_flag_pos():
print(res)
break
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/cookie_decoder.py | ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/cookie_decoder.py | """ Flask Session Cookie Decoder/Encoder """
__author__ = 'Wilson Sumanang, Alexandre ZANNI'
# https://github.com/noraj/flask-session-cookie-manager/blob/master/flask_session_cookie_manager3.py
# standard imports
import sys
import zlib
from itsdangerous import base64_decode
import ast
# external Imports
from flask.sessions import SecureCookieSessionInterface
def cookie_decode(session_cookie_value, secret_key=None):
""" Decode a Flask cookie """
try:
if(secret_key==None):
compressed = False
payload = session_cookie_value
if payload.startswith('.'):
compressed = True
payload = payload[1:]
data = payload.split(".")[0]
data = base64_decode(data)
if compressed:
data = zlib.decompress(data)
return data
else:
app = MockApp(secret_key)
si = SecureCookieSessionInterface()
s = si.get_signing_serializer(app)
return s.loads(session_cookie_value)
except Exception as e:
return "[Decoding error] {}".format(e)
raise e | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/server.py | ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/server.py | import random
from time import time
from base64 import b64encode
from flask import Flask, session, request, make_response
from maze import Maze
from solver import solve
from random import choice
def gen_sec_key():
return "]!74hc_51ht_3vl0s_yltn4tsn1_ot_no155e5_wen_a_3ta3rc_tn4c_u0y_3rus_m4_I[ftci"[::-1]
def is_prime(x):
return all(x % i for i in range(2, x))
def get_primes_between(l, u):
return [a for a in range(l, u) if is_prime(a)]
def random_prime(l, u):
return random.choice(get_primes_between(l, u))
def delete_session():
for key in list(session.keys()):
session.pop(key)
def parse_directions(directions):
# do some super important checks, so the player can't do the "jump through walls" glitch
if len(directions) == 3:
if 3 * ord(directions[0]) - 2 * ord(directions[1]) + 1 * ord(directions[2]) == 282:
if 4 * ord(directions[0]) - 3 * ord(directions[1]) + 2 * ord(directions[2]) == 423:
if 1 * ord(directions[0]) - 4 * ord(directions[1]) + 3 * ord(directions[2]) == 88:
# GLITCH DETECTED, ABORT IMMEDIATELY
delete_session()
raise Exception("How dare you trying to cheat? Your session was deleted, you brought this to yourself!")
return list(directions)
app = Flask(__name__)
app.config['SECRET_KEY'] = gen_sec_key()
# https://blog.miguelgrinberg.com/post/how-secure-is-the-flask-user-session
# -> everyone can read the content of the session cookie, but not change it (if the secret is secure)
FLAG = open("flag.txt", "r").read()
"""
p1 = random_prime(50, 100)
p2 = random_prime(50, 100)
flag_enc = [0x1337]
for i in range(len(FLAG)):
flag_enc.append((flag_enc[-1] + ord(FLAG[i])) * p1 * p2)
"""
flag_enc = open("flag.txt.enc", "r").read()
@app.route('/')
def init():
delete_session()
maze = Maze()
session["maze"] = str(maze)
session["tries"] = 0
return make_response(f"Successfully initialized a new maze. It is stored in your session cookie.")
@app.route('/step')
def step():
# check if session still alive
for k in ["maze", "tries"]:
if k not in session.keys():
return make_response("Session died! Please send a GET request to '/' to get a new and valid session!")
# directions check
if not request.args.get('directions'):
return make_response("No direction(s) specified!")
else:
directions = parse_directions(request.args.get('directions'))
maze = Maze(data=session["maze"])
for d in directions:
if d not in maze.get_actions():
continue
# is valid, do step
maze.step(d)
# all done, update maze in session
session["maze"] = str(maze)
session["tries"] += 1
if maze.get_player_pos() == maze.get_flag_pos():
tries = session["tries"]
delete_session()
if tries > 1:
return make_response("You interacted multiple times with the '/step' endpoint. So you just get a super secure encrypted flag. Next time, try implementing Dijkstra's algorithm to solve the maze in one go, or try decrypting the flag:\n" + flag_enc)
return make_response(FLAG)
return make_response(f"New pos: {maze.get_player_pos()}")
@app.errorhandler(404)
def not_found(e):
return "Invalid url! Only '/step' and '/' are allowed."
@app.errorhandler(500)
def error(e):
return "Unexpected error occured! \nAnyways, here is your encripted flag for crashing it: " + flag_enc
if __name__ == "__main__":
app.run(host='127.0.0.1', port=9001) | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/maze.py | ctfs/ImaginaryCTF/2021/web/aMAZEing-challenge/maze.py | import random
from os import system
from time import sleep
from solver import solve
START_POS = (1, 1)
MIN_STEPS = 2
WALL = "โโ"
NEWLINE = "\n"
CLEAR = " "
FLAG = "{}"
PLAYER = "[]"
WALL_ALT = "##"
NEWLINE_ALT = "n"
UP, LEFT, DOWN, RIGHT = "w", "a", "s", "d"
class Maze:
def __init__(self, size=(79,39), data=None, verbose=False):
self._player_pos = START_POS
self._flag_at = (-1, -1)
self._maze = [[Node(-1, -1)]]
if data is None:
min_steps = (size[0] + size[1]) // 3 * 2 # make sure the flag is far from the start pos
self.gen_maze(size, min_steps, verbose)
else:
self.parse_maze(data)
def gen_maze(self, size, min_steps, verbose):
# init all nodes as walls
self._maze = []
for i in range(size[1]):
line = []
for j in range(size[0]):
line.append(Node((i, j)))
self._maze.append(line)
def calc_new_frontier_cells(pos, passage, frontier):
i, j = pos
# add new frontiers for given pos
if i > 2 and (i - 2, j) not in passage and (i - 2, j) not in frontier:
frontier.append((i - 2, j))
if j > 2 and (i, j - 2) not in passage and (i, j - 2) not in frontier:
frontier.append((i, j - 2))
if i < size[1] - 3 and (i + 2, j) not in passage and (i + 2, j) not in frontier:
frontier.append((i + 2, j))
if j < size[0] - 3 and (i, j + 2) not in passage and (i, j + 2) not in frontier:
frontier.append((i, j + 2))
def get_between_cell(pos, passage):
valid_neighbours = []
i, j = pos
for c in passage:
if c in [(i - 2, j), (i, j - 2), (i + 2, j), (i, j + 2)]: # cell is a neighbour of pos
valid_neighbours.append(c)
if len(valid_neighbours) == 0:
return valid_neighbours
ni, nj = random.choice(valid_neighbours)
between_cell = ((i + ni) // 2, (j + nj) // 2) # avg of coords== between cell coords
return between_cell
def get_node_from_pos(pos):
return self._maze[pos[0]][pos[1]]
# init start pos as passage
start_cell = get_node_from_pos(START_POS)
start_cell.clear_wall()
# init frontier algo, add start_pos to passage and frontier = []
passage = [START_POS]
frontier = []
calc_new_frontier_cells(START_POS, passage, frontier)
# create the maze with the prim's algorithm
while len(frontier) > 0:
if verbose:
# Just overwrite all previous data with this big a** string
system("clear")
print(self.__str__())
sleep(0.01)
# choose a random frontier cell
cell_pos = random.choice(frontier)
between_cell_pos = get_between_cell(cell_pos, passage)
frontier.remove(cell_pos)
cell = get_node_from_pos(cell_pos)
cell.clear_wall()
between_cell = get_node_from_pos(between_cell_pos)
between_cell.clear_wall()
# between cells are not valid next cells, only the cell variables!
passage.append(cell_pos)
# now add the new frontier cells
calc_new_frontier_cells(cell_pos, passage, frontier)
# assert that flag pos is far away from player, throws error if no path found from flag to player
while True:
self._flag_at = random.choice(passage)
way = solve(self)
if verbose:
system("clear")
print(self.__str__())
sleep(0.5)
if len(way) >= min_steps:
# maze generated and flag is far enough from the player -> done
if verbose:
print("There is no such thing as an polynomial runtime algorihtm for finding the shortest path between two points. Or is there?")
print("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")
break
def parse_maze(self, string):
if NEWLINE in string:
raw_maze = string.split(NEWLINE)[:-1]
else:
raw_maze = string.split(NEWLINE_ALT)[:-1]
self._maze = []
for i in range(len(raw_maze)):
line = []
for j in range(0, len(raw_maze[i]), 2): # maze chars are 2 wide
is_wall = raw_maze[i][j:j+2] in [WALL, WALL_ALT]
if raw_maze[i][j:j+2] == PLAYER:
self._player_pos = (i, j//2)
if raw_maze[i][j:j+2] == FLAG:
self._flag_at = (i, j//2)
n = Node((i, j//2), is_wall)
line.append(n)
self._maze.append(line)
def __str__(self):
s = ""
if not hasattr(self, "_flag_at"):
self._flag_at = (-1, -1)
if not hasattr(self, "_player_pos"):
self._player_pos = (-1, -1)
for i in range(len(self._maze)):
for j in range(len(self._maze[i])):
if self._player_pos == (i, j): # show player over flag
s += PLAYER
elif self._flag_at == (i, j):
s += FLAG
else:
s += self._maze[i][j].render() # from class node
s += NEWLINE
return s
def ascii_render(self):
s = str(self)
return s.replace(WALL, WALL_ALT).replace(NEWLINE, NEWLINE_ALT)
def get_player_pos(self):
return self._player_pos
def get_player_node(self):
i, j = self._player_pos
return self._maze[i][j]
def get_flag_pos(self):
return self._flag_at
def get_flag_node(self):
i, j = self._flag_at
return self._maze[i][j]
def get_actions(self, only_directions=True, pos=None):
if pos is None:
i, j = self._player_pos
else:
i, j = pos
actions = ""
nodes = []
if not self._maze[i - 1][j].is_wall():
actions += UP
nodes.append(self._maze[i - 1][j])
if not self._maze[i + 1][j].is_wall():
actions += DOWN
nodes.append(self._maze[i + 1][j])
if not self._maze[i][j - 1].is_wall():
actions += LEFT
nodes.append(self._maze[i][j - 1])
if not self._maze[i][j + 1].is_wall():
actions += RIGHT
nodes.append(self._maze[i][j + 1])
if only_directions:
return actions
return zip(list(actions), nodes)
def step(self, direction):
if direction not in self.get_actions():
return
i, j = self._player_pos
if direction == UP:
self._player_pos = (i - 1, j)
if direction == DOWN:
self._player_pos = (i + 1, j)
if direction == LEFT:
self._player_pos = (i, j - 1)
if direction == RIGHT:
self._player_pos = (i, j + 1)
def show_solve(self, way_to_flag):
for direction in way_to_flag:
system("clear")
self.step(direction)
print(self.__str__())
sleep(0.1)
def reset_solve(self):
for line in self._maze:
for node in line:
node.reset()
class Node:
def __init__(self, pos, is_wall=True):
self._pos = pos
self._is_wall = is_wall
self._prev = "", None # direction from prev_node to this node, prev_node
self._dist = 2 ** 32 # Inf
def get_pos(self):
return self._pos
def is_wall(self):
return self._is_wall
def clear_wall(self):
self._is_wall = False
def set_prev(self, direction, node):
self._prev = (direction, node)
def get_prev(self):
return self._prev
def set_dist(self, dist):
self._dist = dist
def get_dist(self):
return self._dist
def reset(self):
self._prev = "", None
self._dist = 2 ** 32
def render(self):
if self.is_wall():
return WALL
return CLEAR
def __str__(self):
return f"{self._pos} {self._dist}"
if __name__ == "__main__":
from sys import argv
m = Maze(verbose=True)
m.step(m.get_actions()[0])
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2021/web/Cookie_Stream/app.py | ctfs/ImaginaryCTF/2021/web/Cookie_Stream/app.py | from flask import Flask, render_template, request, make_response, redirect
from Crypto.Cipher import AES
from Crypto.Util.Padding import pad, unpad
from binascii import hexlify, unhexlify
from os import urandom
from random import randint
from hashlib import sha512
app = Flask(__name__)
key = urandom(16)
cnonce = urandom(8)
users = {
'admin' : '240964a7a2f1b057b898ef33c187f2c2412aa4d849ac1a920774fd317000d33ebb8b0064834ed1f8a74763df4e95cd8c8be3a154b46929c3969ce323db69b81f',
'ImaginaryCTFUser' : '87197acc4657e9adcc2e4e24c77268fa5b95dea2867eacd493a0478a0c493420bfb2280c7e4e579a604e0a243f74a36a8931edf71b088add09537e54b11ce326',
'Eth007' : '444c67bb7d9d56580e0a2fd1ad00c535e465fc3ca9558e8333512fe65ff971a3dfb6b08f48ea4f91f8e8b55887ec3f0d7634a8df98e636a4134628c95a8f0ebf',
'just_a_normal_user' : 'b109f3bbbc244eb82441917ed06d618b9008dd09b3befd1b5e07394c706a8bb980b1d7785e5976ec049b46df5f1326af5a2ea6d103fd07c95385ffab0cacbc86',
'firepwny' : '6adee5baa5ad468ac371d40771cf2e83e3033f91076f158d2c8d5d7be299adfce15247067740edd428ef596006d6eaa843b36cc109618e0a1cae843b6eed5c29',
':roocursion:' : '7f5310d2675c09c1b274f7642bf4979b2ce642515551a7617d155033e77ecfd53dede33ee541adde2f1072739696d0138d1b2f90c9ecc596095fa43b759e9baa',
}
def check(username, password):
if username not in users.keys():
return False
if sha512(password.encode()).hexdigest() == users[username]:
return True
@app.route('/')
def index():
return render_template('login.html')
@app.route('/backend', methods=['GET', 'POST'])
def backend():
if request.method == 'POST':
if not check(request.form['username'], request.form['password']):
return 'Wrong username/password.'
resp = make_response(redirect('/home'))
nonce = urandom(8)
cipher = AES.new(key, AES.MODE_CTR, nonce=nonce) # my friend told me that cbc had some weird bit flipping attack? ctr sounds way cooler anyways
cookie = hexlify(nonce + cipher.encrypt(pad(request.form['username'].encode(), 16)))
resp.set_cookie('auth', cookie)
return resp
else:
return make_response(redirect('/home'))
@app.route('/home', methods=['GET'])
def home():
nonce = unhexlify(request.cookies.get('auth')[:16])
cipher = AES.new(key, AES.MODE_CTR, nonce=nonce)
username = unpad(cipher.decrypt(unhexlify(request.cookies.get('auth')[16:])), 16).decode()
if username == 'admin':
flag = open('flag.txt').read()
return render_template('fun.html', username=username, message=f'Your flag: {flag}')
else:
return render_template('fun.html', username=username, message='Only the admin user can view the flag.')
@app.errorhandler(Exception)
def handle_error(e):
return redirect('/')
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/gdbjail1_492_pts/main.py | ctfs/ImaginaryCTF/2024/misc/gdbjail1_492_pts/main.py | import gdb
def main():
gdb.execute("file /bin/cat")
gdb.execute("break read")
gdb.execute("run")
while True:
try:
command = input("(gdb) ")
if command.strip().startswith("break") or command.strip().startswith("set") or command.strip().startswith("continue"):
try:
gdb.execute(command)
except gdb.error as e:
print(f"Error executing command '{command}': {e}")
else:
print("Only 'break', 'set', and 'continue' commands are allowed.")
except:
pass
if __name__ == "__main__":
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/Left_in_the_Dark/maze.py | ctfs/ImaginaryCTF/2024/misc/Left_in_the_Dark/maze.py | #!/usr/bin/env python3
from random import choice
from copy import deepcopy
# https://pypi.org/project/console/
from console.utils import wait_key
class Maze:
def __init__(self, dim, size):
self.dim = dim
self.size = size
self.maze = '#'
self.loc = tuple([0]*dim)
for i in range(dim):
self.maze = [deepcopy(self.maze) for _ in range(size)]
self.gen()
def __str__(self):
if type(self.maze[0]) == str:
return ''.join(self.maze)+'\n'
ret = ''
for i in self.maze:
temp = deepcopy(self)
temp.dim -= 1
temp.maze = i
ret += str(temp)
ret += "\n"
return ret
@staticmethod
def fromstr(s):
dim = 0
for i in s[-max(len(s), 50):][::-1]:
if i == '\n':
dim += 1
else:
break
size = 0
for i in s[:max(len(s), 50):]:
if i == '\n':
break
size += 1
ret = Maze(2, 2)
ret.maze = Maze.fromstrhelp(s, dim, size)
ret.dim = dim
ret.size = size
ret.loc = tuple([0]*dim)
return ret
@staticmethod
def fromstrhelp(s, dim, size):
s = s.strip()
if dim == 1:
return list(s)
return [Maze.fromstrhelp(i+'\n'*(dim-1), dim-1, size) for i in s.split('\n'*(dim-1))]
def get(self, *pt):
ret = self.maze
for idx in pt:
ret = ret[idx]
return ret
def set(self, *pt, **kwargs):
temp = self.maze
for idx in pt[:-1]:
temp = temp[idx]
temp[pt[-1]] = kwargs['val']
def check(self, *pt):
for i in pt:
if i >=self.size or i < 0:
return False
return True
def adj(self, *pt):
ret = set()
for i in range(len(pt)):
newpt = [i for i in pt]
newpt[i] += 1
if self.check(*newpt):
ret = ret | {tuple(newpt)}
newpt[i] -= 2
if self.check(*newpt):
ret = ret | {tuple(newpt)}
return ret
def neighbors(self, *pt, typ=None):
ret = set()
for pt in self.adj(*pt):
if typ is None or self.get(*pt) in typ:
ret = ret | {pt}
return ret
def gen(self):
self.set(*self.loc, val=' ')
walls = self.adj(*self.loc)
while len(walls) > 0:
rand = choice(list(walls))
nbhd = self.neighbors(*rand, typ=' ')
if len(nbhd) == 1:
self.set(*rand, val=' ')
walls = walls | self.neighbors(*rand, typ='#')
walls = walls - {rand}
self.set(*([0]*self.dim), val='@')
for i in self.neighbors(*([0]*self.dim)):
self.set(*i, val=' ')
self.set(*([self.size-1]*self.dim), val='F')
for i in self.neighbors(*([self.size-1]*self.dim)):
self.set(*i, val=' ')
def move(self, mv):
newLoc = (self.loc[0] + mv[0], self.loc[1] + mv[1])
if (
newLoc[0] < 0 or newLoc[0] >= self.size or
newLoc[1] < 0 or newLoc[1] >= self.size or
self.get(*newLoc) == '#'
):
print("BONK")
return
if self.get(*newLoc) == 'F':
print(open("flag.txt").read())
wait_key()
exit(0)
self.set(*self.loc, val=' ')
self.set(*newLoc, val='@')
self.loc = newLoc
def getKey():
key = wait_key()
if key == chr(3): # Ctrl-C
exit(1)
return key
moveDict = {
'w': (-1, 0),
's': (1, 0),
'd': (0, 1),
'a': (0, -1),
}
def waitForMove():
key = None
while key not in moveDict:
key = getKey()
return moveDict[key]
def main():
maze = Maze(2, 40)
print("Find the flag in this maze. Good luck!")
print("WASD to move.")
while True:
# print(maze)
move = waitForMove()
maze.move(move)
if __name__ == '__main__':
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/ok_nice/jail.py | ctfs/ImaginaryCTF/2024/misc/ok_nice/jail.py | #!/usr/bin/env python3
flag = open('flag.txt').read()
print("Welcome to the jail! It is so secure I even have a flag variable!")
blacklist=['0','1','2','3','4','5','6','7','8','9','_','.','=','>','<','{','}','class','global','var','local','import','exec','eval','t','set','blacklist']
while True:
inp = input("Enter input: ")
for i in blacklist:
if i in inp:
print("ok nice")
exit(0)
for i in inp:
if (ord(i) > 125) or (ord(i) < 40) or (len(set(inp))>17):
print("ok nice")
exit(0)
try:
eval(inp,{'__builtins__':None,'ord':ord,'flag':flag})
print("ok nice")
except:
print("error")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/starship/main.py | ctfs/ImaginaryCTF/2024/misc/starship/main.py | #!/usr/bin/env python3
import pandas as pd
from io import StringIO
from sklearn.neighbors import KNeighborsClassifier
from gen import gen_data
done = False
flag = open("flag.txt").read().strip()
def menu():
print("1. show dataset")
print("2. train model")
print("3. predict state")
print("4. check incoming objects")
def train_dataset(dataset):
df = pd.read_csv(StringIO(dataset))
X, y = df.iloc[:, :-1].values, df.iloc[:, -1].values
model = KNeighborsClassifier(n_neighbors=3)
model.fit(X, y)
return model
if __name__ == "__main__":
print("<[ missle defense system control panel ]>")
menu()
print("initializing...")
while True:
dataset, incoming = gen_data()
model = train_dataset(dataset)
pred1 = model.predict([list(map(int, incoming[0].split(",")))])
pred2 = model.predict([list(map(int, incoming[1].split(",")))])
if pred1[0] == "enemy" and pred2[0] == "enemy":
break
while True:
choice = int(input("> "))
if choice == 1:
print("--- BEGIN DATASET ---")
print(dataset)
print("--- END DATASET ---")
if choice == 2:
model = train_dataset(dataset)
print("model trained!")
if choice == 3:
inp = input("enter data: ")
pred = model.predict([list(map(int, inp.split(",")))])
print(f"result: {pred}")
if choice == 4:
pred1 = model.predict([list(map(int, incoming[0].split(",")))])
pred2 = model.predict([list(map(int, incoming[1].split(",")))])
print(f"target 1: {incoming[0]} | result: {pred1[0]}")
print(f"target 2: {incoming[1]} | result: {pred2[0]}")
if pred1[0] == "friendly" and pred2[0] == "friendly":
print(f"flag: {flag}")
if choice == 42 and not done:
inp = input("enter data: ")
inp = inp.split(",")
for i in range(9):
inp[i] = int(inp[i])
if len(inp) == 10:
dataset = dataset.strip() + "\n" + ",".join(map(str,inp))
done = True
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/gdbjail2/main.py | ctfs/ImaginaryCTF/2024/misc/gdbjail2/main.py | import gdb
blacklist = ["p", "-", "&", "(", ")", "[", "]", "{", "}", "0x"]
def main():
gdb.execute("file /bin/cat")
gdb.execute("break read")
gdb.execute("run")
while True:
try:
command = input("(gdb) ")
if any([word in command for word in blacklist]):
print("Banned word detected!")
continue
if command.strip().startswith("break") or command.strip().startswith("set") or command.strip().startswith("continue"):
try:
gdb.execute(command)
except gdb.error as e:
print(f"Error executing command '{command}': {e}")
else:
print("Only 'break', 'set', and 'continue' commands are allowed.")
except:
pass
if __name__ == "__main__":
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/gdbjail1/main.py | ctfs/ImaginaryCTF/2024/misc/gdbjail1/main.py | import gdb
def main():
gdb.execute("file /bin/cat")
gdb.execute("break read")
gdb.execute("run")
while True:
try:
command = input("(gdb) ")
if command.strip().startswith("break") or command.strip().startswith("set") or command.strip().startswith("continue"):
try:
gdb.execute(command)
except gdb.error as e:
print(f"Error executing command '{command}': {e}")
else:
print("Only 'break', 'set', and 'continue' commands are allowed.")
except:
pass
if __name__ == "__main__":
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/misc/calc/server.py | ctfs/ImaginaryCTF/2024/misc/calc/server.py | #!/usr/bin/env python3
from sys import addaudithook
from os import _exit
from re import match
def safe_eval(exit, code):
def hook(*a):
exit(0)
def dummy():
pass
dummy.__code__ = compile(code, "<code>", "eval")
addaudithook(hook)
return dummy()
if __name__ == "__main__":
expr = input("Math expression: ")
if len(expr) <= 200 and match(r"[0-9+\-*/]+", expr):
print(safe_eval(_exit, expr))
else:
print("Do you know what is a calculator?")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/rev/vokram/vm.py | ctfs/ImaginaryCTF/2024/rev/vokram/vm.py | #!/usr/bin/env python3
def vokram(text, program):
while True:
for pat, repl, stop in program:
if pat in text:
text = text.replace(pat, repl, 1)
if stop:
return text
break
else:
return text
def parse(source):
program = []
for line in source.strip().splitlines():
pat, repl = line.split(":", 1)
stop = False
if len(repl) > 0 and repl[0] == ":":
repl = repl[1:]
stop = True
if ":" in repl:
raise ValueError("invalid rule: %r" % line)
program.append((pat, repl, stop))
return program
if __name__ == "__main__":
import sys
source_file = sys.argv[1]
input_str = sys.argv[2]
with open(source_file) as f:
program = parse(f.read())
print(vokram(input_str, program))
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/solitude/main.py | ctfs/ImaginaryCTF/2024/crypto/solitude/main.py | #!/usr/bin/env python3
import random
def xor(a: bytes, b: bytes):
out = []
for m,n in zip(a,b):
out.append(m^n)
return bytes(out)
class RNG():
def __init__(self, size, state=None):
self.size = size
self.state = list(range(self.size+2))
random.shuffle(self.state)
def next(self):
idx = self.state.index(self.size)
self.state.pop(idx)
self.state.insert((idx+1) % (len(self.state)+1), self.size)
if self.state[0] == self.size:
self.state.pop(0)
self.state.insert(1, self.size)
idx = self.state.index(self.size+1)
self.state.pop(idx)
self.state.insert((idx+1) % (len(self.state)+1), self.size+1)
if self.state[0] == self.size+1:
self.state.pop(0)
self.state.insert(1, self.size+1)
if self.state[1] == self.size+1:
self.state.pop(1)
self.state.insert(2, self.size+1)
c1 = self.state.index(self.size)
c2 = self.state.index(self.size+1)
self.state = self.state[max(c1,c2)+1:] + [self.size if c1<c2 else self.size+1] + self.state[min(c1,c2)+1:max(c1,c2)] + [self.size if c1>c2 else self.size+1] + self.state[:min(c1,c2)]
count = self.state[-1]
if count in [self.size,self.size+1]:
count = self.size
self.state = self.state[count:-1] + self.state[:count] + self.state[-1:]
idx = self.state[0]
if idx in [self.size,self.size+1]:
idx = self.size
out = self.state[idx]
if out in [self.size,self.size+1]:
out = self.next()
return out
if __name__ == "__main__":
flag = open("flag.txt", "rb").read()
while True:
i = int(input("got flag? "))
for _ in range(i):
rng = RNG(128)
stream = bytes([rng.next() for _ in range(len(flag))])
print(xor(flag, stream).hex())
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/integrity/main.py | ctfs/ImaginaryCTF/2024/crypto/integrity/main.py | from Crypto.Util.number import *
from binascii import crc_hqx
p = getPrime(1024)
q = getPrime(1024)
n = p*q
e = 65537
tot = (p-1)*(q-1)
d = pow(e, -1, tot)
flag = bytes_to_long(open("flag.txt", "rb").read())
ct = pow(flag, e, n)
#signature = pow(flag, d, n) # no, im not gonna do that
signature = pow(flag, crc_hqx(long_to_bytes(d), 42), n)
print(f"{n = }")
print(f"{ct = }")
print(f"{signature = }")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/notitle/chall.py | ctfs/ImaginaryCTF/2024/crypto/notitle/chall.py | from sage.all import *
import os
from Crypto.Cipher import AES
from hashlib import sha512
proof.all(False)
p = 0x7AADA0BA1C05D63803BA6BCE66CB6BC091C7ADA62B5CB5BC9F924B528FC113971D4BC54C7FAF3C146ADEB0548BFB9258DFF316741266B802DD7A2F46F77593BAD983E6DF394C1519E8DB0130289FA5A9C628E3ABCE58C63B3379DB7088AAC7A40B63776959774B1B57B8FD316C650AE3C012A91EE653477443446050438A99E79B89B69745BD1918EECB08A0C9D45EF3C61639137F24D979FF380D65C7ABD08785F1AF99729A62F3690747AEC4CCBDA99BAE6E990A0FEFF6F1AB9ABEAFE7FB5BDDB8471C607DEC16198A2AE7776C56B5B6CA24B4C0A2441A047A18EB23302B46CC49ADFF6188FC97C886D5BF67B4B0EFF56762C4E48AAD3F02E7CFE8AA157FB1789B1
F = GF(p)
def magic_op(x, n):
r0, r1 = 1, x
for b in f"{n:b}":
if b == "0":
r1 = 2 * r0 * r1 - x
r0 = 2 * r0**2 - 1
else:
r0 = 2 * r0 * r1 - x
r1 = 2 * r1**2 - 1
return r0
if __name__ == "__main__":
with open("flag.txt", "rb") as f:
flag = f.read().strip()
h = int(sha512(flag).hexdigest(), 16)
magic_pi = magic_op(F(314159), h)
magic_e = magic_op(F(271828), h)
key = os.urandom(16)
k = F(int.from_bytes(key, "big"))
fake_k = [F.random_element() for _ in range(63)]
fake_k += [k - sum(fake_k)]
obfuscated_keys = [magic_op(k, h) for k in fake_k]
cipher = AES.new(key, AES.MODE_CTR)
ct = cipher.encrypt(flag)
iv = cipher.nonce
print(f"{magic_pi = }")
print(f"{magic_e = }")
print(f"{obfuscated_keys = }")
print(f"{ct = }")
print(f"{iv = }")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/lf3r/chall.py | ctfs/ImaginaryCTF/2024/crypto/lf3r/chall.py | import secrets, os
n = 256
MASK = 0x560074275752B31E43E64E99D996BC7B5A8A3DAC8B472FE3B83E6C6DDB5A26E7
class LF3R:
def __init__(self, n, key, mask):
self.n = n
self.state = key & ((1 << n) - 1)
self.mask = mask
def __call__(self):
v = self.state % 3
self.state = (self.state >> 1) | (
((self.state & self.mask).bit_count() & 1) << (self.n - 1)
)
return v
def int_to_base(n, b):
digits = []
while n:
digits.append(n % b)
n //= b
return digits
if __name__ == "__main__":
key = secrets.randbits(n)
lf3r = LF3R(n, key, MASK)
stream = [lf3r() for _ in range(2048)]
flag = os.environ["FLAG"].encode()
flag_digits = int_to_base(int.from_bytes(flag, "big"), 3)
stream += [(x + lf3r()) % 3 for x in flag_digits]
print(f"{stream = }")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/tango/server.py | ctfs/ImaginaryCTF/2024/crypto/tango/server.py | from Crypto.Cipher import Salsa20
from Crypto.Util.number import bytes_to_long, long_to_bytes
import json
from secrets import token_bytes, token_hex
from zlib import crc32
from secret import FLAG
KEY = token_bytes(32)
def encrypt_command(command):
if len(command) != 3:
print('Nuh uh.')
return
cipher = Salsa20.new(key=KEY)
nonce = cipher.nonce
data = json.dumps({'user': 'user', 'command': command, 'nonce': token_hex(8)}).encode('ascii')
checksum = long_to_bytes(crc32(data))
ciphertext = cipher.encrypt(data)
print('Your encrypted packet is:', (nonce + checksum + ciphertext).hex())
def run_command(packet):
packet = bytes.fromhex(packet)
nonce = packet[:8]
checksum = bytes_to_long(packet[8:12])
ciphertext = packet[12:]
try:
cipher = Salsa20.new(key=KEY, nonce=nonce)
plaintext = cipher.decrypt(ciphertext)
if crc32(plaintext) != checksum:
print('Invalid checksum. Aborting!')
return
data = json.loads(plaintext.decode('ascii'))
user = data.get('user', 'anon')
command = data.get('command', 'nop')
if command == 'nop':
print('...')
elif command == 'sts':
if user not in ['user', 'root']:
print('o_O')
return
print('The server is up and running.')
elif command == 'flag':
if user != 'root':
print('You wish :p')
else:
print(FLAG)
else:
print('Unknown command.')
except (json.JSONDecodeError, UnicodeDecodeError):
print('Invalid data. Aborting!')
def menu():
print('[E]ncrypt a command')
print('[R]un a command')
print('[Q]uit')
def main():
print('Welcome to the Tango server! What would you like to do?')
while True:
menu()
option = input('> ').upper()
if option == 'E':
command = input('Your command: ')
encrypt_command(command)
elif option == 'R':
packet = input('Your encrypted packet (hex): ')
run_command(packet)
elif option == 'Q':
exit(0)
else:
print('Unknown option:', option)
if __name__ == '__main__':
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2024/crypto/base64/main.py | ctfs/ImaginaryCTF/2024/crypto/base64/main.py | from Crypto.Util.number import bytes_to_long
q = 64
flag = open("flag.txt", "rb").read()
flag_int = bytes_to_long(flag)
secret_key = []
while flag_int:
secret_key.append(flag_int % q)
flag_int //= q
print(f"{secret_key = }")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/misc/Temu/temu.py | ctfs/ImaginaryCTF/2023/misc/Temu/temu.py | #!/usr/bin/env python3
# https://pypi.org/project/console/
from console.screen import Screen
from console.utils import wait_key
from console import fg
from multiprocessing import Process, Manager
from typing import List
from dataclasses import dataclass
import re
@dataclass
class File:
name: str
contents: str
owner: str
@dataclass
class User:
name: str
disallowed_commands: List[str]
cwd = "/home/a/"
user_input = ''
user_input_store = ''
history = []
history_idx = 0
users = {
"alice": User("alice", ["cat"]),
"bob": User("bob", ["cat"]),
"eve": User("eve", []),
}
files = {
cwd+"flag.txt": File("flag.txt", open("flag.txt").read(), "alice"),
cwd+"bobthoughts.bob": File("bobthoughts.bob", open("bobthoughts.bob").read(), "bob"),
cwd+"fl@g.txt": File("fl@g.txt", open("fl@g.txt").read(), "eve"),
}
class Command:
valid_commands = {
"login": "Login as a user.\r\n\tUsage: login <username>",
"cat": "Display file contents (absolute paths only).\r\n\tUsage: cat <filename>",
"ls": "List files in the current directory.\r\n\tUsage: ls",
"whoami": "Display current users.\r\n\tUsage: whoami",
"pwd": "Print working directory.\r\n\tUsage: pwd",
"help": "Display this help text.\r\n\tUsage: help",
}
def __init__(self, cmd):
self.cmd = cmd
def start(self):
global g
Process(target=self.run, args=tuple()).start()
def run(self):
global screen_buffer, users, current_user
if self.cmd.strip() == '':
screen_buffer += list('\r\n>>> ')
return
cmd_vals = self.cmd.strip().split()
cmd = cmd_vals[0]
args = cmd_vals[1:]
if cmd in users[current_user.value].disallowed_commands:
screen_buffer += fmt(f"{self.cmd}\r\nUser {current_user.value} does not have permission to run {cmd}.\r\n")
elif cmd not in self.valid_commands:
screen_buffer += fmt(f"{self.cmd}\r\nInvalid command '{cmd}'.\r\n")
else:
screen_buffer += fmt(self.cmd + "\r\n")
func = getattr(self, f"_{cmd}")
screen_buffer += fmt(func(*args))
screen_buffer += list(">>> ")
def _login(self, *args):
global current_user
if len(args) == 0:
return "Must provide user to login as.\r\n"
if args[0] in users:
current_user.value = args[0]
return f"Logged in as {current_user.value}\r\n"
return "That user doesn't exist!\r\n"
def _cat(self, *args):
global files, current_user
if len(args) == 0:
return "No file provided.\r\n"
fname = args[0]
if fname[0][0] != '/':
return "Absolute paths only.\r\n"
if fname not in files:
return "File not found.\r\n"
if files[fname].owner != current_user.value:
return f"User {current_user.value} does not have permission to read file {fname}.\r\n"
return files[fname].contents
def _ls(self, *args):
global files
ret = "Filename\t\t\t\tOwner\r\n"
ret += '-'*48 + "\r\n"
for fname in files:
ret += fname + "\t\t\t" + files[fname].owner + '\r\n'
return ret
def _help(self, *args):
global current_user, users
ret = ''
for cmd in self.valid_commands:
if cmd in users[current_user.value].disallowed_commands:
continue
ret += cmd + ":\t" + self.valid_commands[cmd] + "\r\n\r\n"
return ret[:-1]
def _whoami(self, *args):
global current_user
return current_user.value + "\r\n"
def _pwd(self, *args):
global cwd
return cwd + "\r\n"
def p(*args, **kwargs):
global screen
print(*args, **kwargs)
screen._stream.flush()
# quick hack to make colors work on remote
# comment this class out if running locally
class fg:
yellow = '\033[33m'
blue = '\033[34m'
purple = '\033[35m'
cyan = '\033[36m'
red = '\033[31m'
lightgreen = '\033[92m'
lightmagenta = '\033[95m'
default = '\033[37m'
def fmt(s):
highlights = {
r"((?<=\W)\d+(?=\W))": fg.yellow,
r"((['\"]).*?\2)": fg.blue,
"(" + '|'.join(i for i in Command.valid_commands) + ')': fg.cyan,
r"((/.+)+\.[a-z]{3})": fg.lightmagenta,
r"((?<=\W)(" + '|'.join(i for i in users) + r')(?<=\W))': fg.purple,
r"(ictf{.*?})": fg.lightgreen,
r"(jctf{.*?})": fg.red,
}
for rx in highlights:
s = re.sub(rx, highlights[rx] + r"\1" + fg.default, s)
return list(s)
def clr():
global screen
p(screen.clear, end='')
p(screen.move_to(0, 0), end='')
def read_key():
key = wait_key()
if key == '\x1b':
for _ in range(2):
key += wait_key()
return key
def handle_key():
global user_input, history, history_idx, user_input_store
key = read_key()
match key:
case "\x03":
exit() # Ctrl+C
case "\x04":
exit() # Ctrl+D
case "\x7f":
if len(user_input) > 0:
user_input = user_input[:-1]
case "\r" | "\n" | "\r\n":
Command(user_input).start()
if len(user_input.strip()) > 0:
history.append(user_input)
history_idx = 0
user_input_store = ""
user_input = ""
case '\x1b[A': # up
history_idx += 1
if history_idx > len(history):
history_idx = len(history)
user_input = [user_input_store, *history][-history_idx]
case '\x1b[B': # down
history_idx -= 1
if history_idx < 0:
history_idx = 0
user_input = [user_input_store, *history][-history_idx]
# I wish I had the time to implement right/left arrow keys
case '\x1b[C': # right
...
case '\x1b[D': # left
...
case _:
user_input += key
user_input_store = user_input
def main():
global screen, screen_buffer, user_input
with screen.fullscreen():
screen_buffer += list(">>> ")
p(">>> ", end='')
while 1:
handle_key()
text = ''.join(screen_buffer)
clr()
p(text, end='')
p(user_input, end='')
if __name__ == '__main__':
with Screen(force=True) as screen:
with Manager() as g:
screen_buffer = g.list([])
current_user = g.Value(str, "alice")
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/misc/deletion/main.py | ctfs/ImaginaryCTF/2023/misc/deletion/main.py | #!/usr/bin/env python3
canary = "You will not get the flag!"
inp = input("Enter your payload: ")
reward = input("Enter your reward: ")
for c in inp:
if ord(c) < ord('\n') or ord(c) > ord('~'):
print("Fail!")
exit()
if any([n in inp for n in "dfjlquvwz=_.~!@#$%^&*()[]{}\n;\"'?<>/\\-+|`0123456789 \t"]):
print("Fail!")
exit()
d = ['__name__', '__doc__', '__package__', '__loader__', '__spec__', '__build_class__', '__import__', 'abs', 'all', 'any', 'ascii', 'bin', 'breakpoint', 'callable', 'chr', 'compile', 'delattr', 'dir', 'divmod', 'eval', 'exec', 'format', 'getattr', 'globals', 'hasattr', 'hash', 'hex', 'id', 'input', 'isinstance', 'issubclass', 'iter', 'aiter', 'len', 'locals', 'max', 'min', 'next', 'anext', 'oct', 'ord', 'pow', 'print', 'repr', 'round', 'setattr', 'sorted', 'sum', 'vars', 'None', 'Ellipsis', 'NotImplemented', 'False', 'True', 'bool', 'memoryview', 'bytearray', 'bytes', 'classmethod', 'complex', 'dict', 'enumerate', 'filter', 'float', 'frozenset', 'property', 'int', 'list', 'map', 'object', 'range', 'reversed', 'set', 'slice', 'staticmethod', 'str', 'super', 'tuple', 'type', 'zip', '__debug__', 'BaseException', 'Exception', 'TypeError', 'StopAsyncIteration', 'StopIteration', 'GeneratorExit', 'SystemExit', 'ModuleNotFoundError', 'OSError', 'EnvironmentError', 'IOError', 'EOFError', 'RuntimeError', 'RecursionError', 'NotImplementedError', 'UnboundLocalError', 'AttributeError', 'SyntaxError', 'IndentationError', 'TabError', 'LookupError', 'IndexError', 'KeyError', 'ValueError', 'UnicodeError', 'UnicodeEncodeError', 'UnicodeDecodeError', 'UnicodeTranslateError', 'AssertionError', 'ArithmeticError', 'FloatingPointError', 'OverflowError', 'ZeroDivisionError', 'SystemError', 'ReferenceError', 'MemoryError', 'BufferError', 'Warning', 'UserWarning', 'EncodingWarning', 'DeprecationWarning', 'PendingDeprecationWarning', 'SyntaxWarning', 'RuntimeWarning', 'FutureWarning', 'ImportWarning', 'UnicodeWarning', 'BytesWarning', 'ResourceWarning', 'ConnectionError', 'BlockingIOError', 'BrokenPipeError', 'ChildProcessError', 'ConnectionAbortedError', 'ConnectionRefusedError', 'ConnectionResetError', 'FileExistsError', 'FileNotFoundError', 'IsADirectoryError', 'NotADirectoryError', 'InterruptedError', 'PermissionError', 'ProcessLookupError', 'TimeoutError', 'open', 'quit', 'exit', 'copyright', 'credits', 'license', 'help']
dl = vars(__builtins__)
g = list(globals().keys())
gl = globals()
for n in d:
if not n == "exec":
del dl[n]
for n in g:
if not n in ["canary", "inp", "reward"]:
del gl[n]
del g
del gl
exec(inp)
try:
canary
except:
exec(reward)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/misc/Get_and_set/server.py | ctfs/ImaginaryCTF/2023/misc/Get_and_set/server.py | #!/usr/bin/env python3
import pydash
class Dummy:
pass
if __name__ == "__main__":
obj = Dummy()
while True:
src = input("src: ")
dst = input("dst: ")
pydash.set_(obj, dst, pydash.get(obj, src))
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/misc/You_shall_not_call_Revenge/server.py | ctfs/ImaginaryCTF/2023/misc/You_shall_not_call_Revenge/server.py | import __main__
import pickle
import io
# Security measure -- forbid calls
for op in ['reduce', 'inst', 'obj', 'newobj', 'newobj_ex']: #pickle.REDUCE, pickle.INST, pickle.OBJ, pickle.NEWOBJ, pickle.NEWOBJ_EX]:
id = getattr(pickle, op.upper())[0]
delattr(pickle._Unpickler, pickle._Unpickler.dispatch[id].__name__)
pickle._Unpickler.dispatch[id] = lambda _: print("Stop right there, you heineous criminal!") or exit()
# Security measure -- remove dangerous class and method
del pickle.Unpickler
del pickle._Unpickler.find_class
# Security measure -- overload unpickler with an actually secure class
class SecureUnpickler(pickle._Unpickler):
def find_class(self, _: str, name: str) -> object:
# Security measure -- prevent access to dangerous elements
for x in ['exe', 'os', 'break', 'set', 'eva', 'help', 'sys', 'load', 'open', 'dis']:
if x in name:
print("Smuggling contraband in broad daylight?! Guards!")
break
# Security measure -- only the main module is a valid lookup target
else:
return getattr(__main__, name)
# Security measure -- remove dangerous magic
for k in list(globals()):
if '_' in k and k not in ['__main__', '__builtins__']:
del globals()[k]
# Security measure -- remove dangerous magic
__builtins__ = { k: getattr(__builtins__, k) for k in dir(__builtins__) if '_' not in k }
# My jail is very secure!
data = io.BytesIO(bytes.fromhex(input('$ ')))
SecureUnpickler(data).load() | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/misc/You_shall_not_call/server.py | ctfs/ImaginaryCTF/2023/misc/You_shall_not_call/server.py | import __main__
import pickle
import io
# Security measure -- forbid calls
for op in ['reduce', 'inst', 'obj', 'newobj', 'newobj_ex']: #pickle.REDUCE, pickle.INST, pickle.OBJ, pickle.NEWOBJ, pickle.NEWOBJ_EX]:
id = getattr(pickle, op.upper())[0]
delattr(pickle._Unpickler, pickle._Unpickler.dispatch[id].__name__)
pickle._Unpickler.dispatch[id] = lambda _: print("Stop right there, you heineous criminal!") or exit()
# Security measure -- remove dangerous class and method
del pickle.Unpickler
del pickle._Unpickler.find_class
# Security measure -- overload unpickler with an actually secure class
class SecureUnpickler(pickle._Unpickler):
def find_class(self, _: str, name: str) -> object:
# Security measure -- prevent access to dangerous elements
for x in ['exe', 'os', 'break', 'set', 'eva', 'help', 'sys', 'load', 'open', 'dis']:
if x in name:
print("Smuggling contraband in broad daylight?! Guards!")
break
# Security measure -- only the main module is a valid lookup target
else:
return getattr(__main__, name)
# Security measure -- remove dangerous magic
for k in list(globals()):
if '_' in k and k not in ['__main__', '__builtins__']:
del globals()[k]
# Security measure -- remove dangerous magic
__builtins__ = { k: getattr(__builtins__, k) for k in dir(__builtins__) if '_' not in k }
# My jail is very secure!
data = io.BytesIO(bytes.fromhex(input('$ ')))
SecureUnpickler(data).load() | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/rev/chaos/chall.py | ctfs/ImaginaryCTF/2023/rev/chaos/chall.py | inp = input("What is the flag? ").encode().zfill(51)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | true |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/rev/Sheepish/sheepish.py | ctfs/ImaginaryCTF/2023/rev/Sheepish/sheepish.py | print((((lambda _____________:((lambda ___:_____________(lambda _______:___(___)(_______)))(lambda ___:_____________(lambda _______:___(___)(_______)))))(lambda _____________:lambda ___________:lambda ______:(lambda ____:(lambda _:_(lambda __________:lambda _____:__________))(____))(___________)(lambda _:(lambda __________:lambda _____:__________))(lambda _:(lambda __________:lambda _____:__________(_____)(lambda __________:lambda _____:_____))((lambda __________:lambda _____:(lambda __________:lambda _____:__________(_____)(lambda __________:lambda _____:_____))((lambda __________:lambda _____:(lambda __________:__________(lambda _:(lambda __________:lambda _____:_____))(lambda __________:lambda _____:__________))((lambda __________:lambda _____:_____(lambda __:lambda _____________:lambda ___:__(lambda ____________:lambda _________:_________(____________(_____________)))(lambda _:___)(lambda __________:__________))(__________))(_____)(__________)))(__________)(_____))((lambda __________:lambda _____:(lambda __________:__________(lambda _:(lambda __________:lambda _____:_____))(lambda __________:lambda _____:__________))((lambda __________:lambda _____:_____(lambda __:lambda _____________:lambda ___:__(lambda ____________:lambda _________:_________(____________(_____________)))(lambda _:___)(lambda __________:__________))(__________))(__________)(_____)))(__________)(_____)))((lambda ____:(lambda _:_(lambda __________:lambda _____:__________))((lambda _:_(lambda __________:lambda _____:_____))(____)))(___________))((lambda ____:(lambda _:_(lambda __________:lambda _____:__________))((lambda _:_(lambda __________:lambda _____:_____))(____)))(______)))(_____________((lambda ____:(lambda _:_(lambda __________:lambda _____:_____))((lambda _:_(lambda __________:lambda _____:_____))(____)))(___________))((lambda ____:(lambda _:_(lambda __________:lambda _____:_____))((lambda _:_(lambda __________:lambda _____:_____))(____)))(______))))(lambda __________:lambda _____:__________)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:__________)(lambda __________:lambda _____:__________))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(__________(_____)))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:_____)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:_____)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:_____)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(_____)))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))(lambda __________:lambda _____:_____)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(__________(_____)))))(lambda __________:lambda _____:_____)))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____)))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:__________(lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(_____)))((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:lambda ______________:__________(_____(______________)))(lambda __________:lambda _____:__________(__________(_____)))(lambda __________:lambda _____:__________(__________(__________(_____))))))((lambda __________:lambda _____:_____(__________))(lambda __________:lambda _____:__________(__________(__________(_____))))(lambda __________:lambda _____:__________(__________(_____))))))(((lambda _____________:((lambda ___:_____________(lambda _______:___(___)(_______)))(lambda ___:_____________(lambda _______:___(___)(_______)))))(lambda _____________:(lambda ________:(((lambda ____:lambda ___:(lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:_____)((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(___)(____)))(_____________(________[1:]))(((lambda _____________:((lambda ___:_____________(lambda _______:___(___)(_______)))(lambda ___:_____________(lambda _______:___(___)(_______)))))(lambda _____________:(lambda __:(((lambda __:lambda __________:lambda _____:__________(__(__________)(_____)))(_____________(__-1))) if __ else (lambda __________:lambda _____:_____)))))(________[0]))) if len(________) else ((lambda __________:lambda _____:lambda ______________:______________(__________)(_____))(lambda __________:lambda _____:__________)(lambda __________:lambda _____:__________))))))(input(">>> ").encode())))("Well done!")("Try again...")) | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/rev/snailchecker/check.py | ctfs/ImaginaryCTF/2023/rev/snailchecker/check.py | #!/usr/bin/env python3
def enc(b):
a = [n for n in range(b[0]*2**24+b[1]*2**16+b[2]*2**8+b[3]+1)][1:]
c,i = 0,0
while len([n for n in a if n != 0]) > 1:
i%=len(a)
if (a[i]!=0 and c==1):
a[i],c=0,0
if (a[i] != 0):
c+=1
i += 1
return sum(a)
print(r"""
.----. @ @
/ .-"-.`. \v/
| | '\ \ \_/ )
,-\ `-.' /.' /
'---`----'----'
""")
flag = input("Enter flag here: ").encode()
out = b''
for n in [flag[i:i+4] for i in range(0,len(flag),4)]:
out += bytes.fromhex(hex(enc(n[::-1]))[2:].zfill(8))
if out == b'L\xe8\xc6\xd2f\xde\xd4\xf6j\xd0\xe0\xcad\xe0\xbe\xe6J\xd8\xc4\xde`\xe6\xbe\xda>\xc8\xca\xca^\xde\xde\xc4^\xde\xde\xdez\xe8\xe6\xde':
print("[*] Flag correct!")
else:
print("[*] Flag incorrect.")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/rev/Goated/goated.py | ctfs/ImaginaryCTF/2023/rev/Goated/goated.py | print((((lambda ______:((lambda ___:______(lambda _:___(___)(_)))(lambda ___:______(lambda _:___(___)(_)))))(lambda ______:lambda __:lambda _________________:(lambda _________:(lambda _____________:_____________(lambda ____________:lambda ______________:____________))(_________))(__)(lambda _:(lambda ____________:lambda ______________:____________))(lambda _:(lambda ____________:lambda ______________:____________(______________)(lambda ____________:lambda ______________:______________))((lambda ____________:lambda ______________:(lambda ____________:____________(lambda ____________:lambda ______________:______________)(lambda ____________:lambda ______________:____________))((lambda ____________:lambda ______________:____________(______________(lambda ____________:lambda ______________:______________)(lambda ____________:lambda ______________:____________))(______________(lambda ____________:lambda ______________:____________)(lambda ____________:lambda ______________:______________)))(____________)(______________)))((lambda _________:(lambda _____________:_____________(lambda ____________:lambda ______________:____________))((lambda _____________:_____________(lambda ____________:lambda ______________:______________))(_________)))(__))((lambda _________:(lambda _____________:_____________(lambda ____________:lambda ______________:____________))((lambda _____________:_____________(lambda ____________:lambda ______________:______________))(_________)))(_________________))) (______((lambda _________:(lambda _____________:_____________(lambda ____________:lambda ______________:______________))((lambda _____________:_____________(lambda ____________:lambda ______________:______________))(_________)))(__))((lambda _________:(lambda _____________:_____________(lambda ____________:lambda ______________:______________))((lambda _____________:_____________(lambda ____________:lambda ______________:______________))(_________)))(_________________))))(lambda ____________:lambda ______________:____________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(___)(_________)))((lambda _________:lambda ___:(lambda ____________:lambda ______________:lambda ________________:________________(____________)(______________))(lambda ____________:lambda ______________:______________)((lambda ____________:lambda ______________:lambda | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | true |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/Imaginary_Casino/server.py | ctfs/ImaginaryCTF/2023/crypto/Imaginary_Casino/server.py | import ctypes
import os
from hashlib import sha512
import signal
# libcsidh interop start
# modified from DiceCTF 2023 - seaside
PRIVATE_KEY_SIZE = 74
PUBLIC_KEY_SIZE = 64
MAX_EXPONENT = 5
# libcsidh: https://yx7.cc/code/csidh/csidh-latest.tar.xz
# Run this to build libcsidh: `(cd csidh-20210627; make; mv libcsidh.so ..)`
libcsidh = ctypes.CDLL("./libcsidh.so")
def apply_iso(start, iso):
end = ctypes.create_string_buffer(PUBLIC_KEY_SIZE)
ret = libcsidh.csidh(end, start, iso)
if not ret:
raise RuntimeError("csidh failed")
return end
def pub_from(buf):
return ctypes.create_string_buffer(buf, PUBLIC_KEY_SIZE)
def priv_from(es):
return ctypes.create_string_buffer(bytes([e & 0xFF for e in es]), PRIVATE_KEY_SIZE)
def rand_priv():
priv = ctypes.create_string_buffer(PRIVATE_KEY_SIZE)
libcsidh.csidh_private(priv)
return priv
def hash_to_priv(buf):
v = int(sha512(bytes(buf)).hexdigest(), 16)
es = []
M = 2 * MAX_EXPONENT + 1
for _ in range(PRIVATE_KEY_SIZE):
es.append(v % M - MAX_EXPONENT)
v //= M
return priv_from(es)
# libcsidh interop end
c1 = libcsidh.base
leet = [1, 3, 3, 7]
leet = (leet * (PRIVATE_KEY_SIZE // len(leet) + 1))[:PRIVATE_KEY_SIZE]
c2 = apply_iso(libcsidh.base, priv_from(leet))
class RNG:
def __init__(self, c1, c2, l, r):
self.c1 = c1
self.c2 = c2
self.l = l
self.r = r
self.c = 0
self.v = 0
self.trunc = 12
def next(self):
self.l, self.r = self.r, hash_to_priv(
apply_iso(apply_iso(self.c1, self.l), self.r)
)
return int.from_bytes(
bytes(apply_iso(apply_iso(self.c2, self.r), self.l)), "little"
)
def bit(self):
if self.c == 0:
self.v = self.next()
self.c = PUBLIC_KEY_SIZE * 8 - self.trunc
self.c -= 1
r = self.v & 1
self.v >>= 1
return r
class Game:
def __init__(self, rng):
self.rng = rng
self.money = 1337
self.win = 13337
def round(self):
bit = int(input("guess > "))
if bit == self.rng.bit():
self.money += 1
print("You win!")
else:
self.money -= 3
print("You lose!")
def play(self):
print("Welcome to Imaginary Casino!")
print(
"Immerse yourself in the captivating simplicity of Imaginary Casino, where a single game of coin flip becomes a thrilling quantum experience. Powered by a quantum-secure random number generator, every flip is truly unpredictable, ensuring an unparalleled level of fairness and excitement."
)
print(
f"You begin your journey at Imaginary Casino with an initial balance of ${self.money}, and as you progress, the grand flag awaits you once you reach the milestone of ${self.win}."
)
print("(Generated by ChatGPT)")
print()
while self.money > 0:
self.round()
print(f"You have ${self.money} left.")
if self.money >= self.win:
print("Here's your flag:")
with open("flag.txt") as f:
print(f.read().strip())
return
print("You're broke!")
if __name__ == "__main__":
signal.alarm(30)
rng = RNG(c1, c2, rand_priv(), rand_priv())
Game(rng).play()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/emoticons/gen.py | ctfs/ImaginaryCTF/2023/crypto/emoticons/gen.py | import random
emojis = [n for n in "๐ธ๐๐ณ๐๐๐๐ฆ๐๐ถ๐๐บ๐ธโก๏ธ๐ฆ๐ผ๐"]
m = open("text.txt", "rb").read().hex()
random.shuffle(emojis)
for e, c in zip(emojis, "0123456789abcdef"):
m = m.replace(c, e)
open("out.txt", "w").write(m)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/Sus/challenge.py | ctfs/ImaginaryCTF/2023/crypto/Sus/challenge.py | from Crypto.Util.number import getPrime, isPrime, bytes_to_long
def sus(sz, d):
while True:
p = getPrime(sz)
pp = sum([p**i for i in range(d)])
if isPrime(pp):
return p, pp
p, q = sus(512, 3)
r = getPrime(512 * 3)
n = p * q * r
e = 65537
m = bytes_to_long(open("flag.txt", "rb").read().strip())
c = pow(m, e, n)
print(f"{n = }")
print(f"{e = }")
print(f"{c = }")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/Wasteful/chall.py | ctfs/ImaginaryCTF/2023/crypto/Wasteful/chall.py | from Crypto.Util.number import *
from math import gcd
def keygen(sz):
p = getPrime(sz // 2)
q = getPrime(sz // 2)
n = p * q
phi = (p - 1) * (q - 1)
e_fast = getPrime(sz // 2)
# to make encryption more time consuming :P
e_slow = e_fast + getPrime(sz // 3) * phi
d = pow(e_fast, -1, phi)
return (n, e_slow), (n, e_fast), (n, d)
def encrypt(pub, m):
n, e = pub
return pow(m, e, n)
def decrypt(priv, c):
n, d = priv
return pow(c, d, n)
pub, pub_fast, priv = keygen(2048)
m = bytes_to_long(open("flag.txt", "rb").read().strip())
c = encrypt(pub, m)
assert c == encrypt(pub_fast, m)
assert decrypt(priv, c) == m
print(f"{pub = }")
print(f"{c = }")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/Blind_guess/main.py | ctfs/ImaginaryCTF/2023/crypto/Blind_guess/main.py | from random import getrandbits
from galois import GF
import numpy as np
DECK = "๐ก๐ข๐ฃ๐ค๐ฅ๐ฆ๐ง๐จ๐ฉ๐ช๐ซ๐ญ๐ฎ"
F = GF(13) # lucky number
n = 10
# Let's not use a singular matrix, please.
# We do quality random over here.
M = [[0]]
while np.linalg.det(M) == 0:
M = F.Random((n, n))
money = 15000
cards = F.Random(n)
while all(int(c) == 0 for c in cards):
cards = F.Random(n)
while money > 0:
print('balance:', money)
choice = input('> ')
if choice == 'buy flag':
if money < 1_000_000_000:
print("You're too poor!")
continue
from redacted import FLAG
money -= 1_000_000_000
print("What a guess god! Here's your flag:", FLAG)
elif choice == 'play':
bet = int(input('bet: '))
assert money >= bet > 0
print("Can you blindly guess my cards?")
cards = np.linalg.matrix_power(M, getrandbits(32)) @ cards # shuffle cards
guess = M @ F([*map(DECK.index, input('guess: ').split())]) # blind guess
total = sum(cards == guess)
print(f'You guessed {total} cards! My hand was:', *[DECK[c] for c in cards])
money += 2*(total - 5)*bet
elif choice == 'exit':
print("Chickened out, huh? No flag for you.")
exit()
print("Woops... Looks like you guessed your way out of money :>") | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/crypto/signer/main.py | ctfs/ImaginaryCTF/2023/crypto/signer/main.py | import textwrap
from binascii import crc32
from Crypto.Util.number import getPrime
p, q = getPrime(1024), getPrime(1024)
n = p*q
e = 65537
d = pow(e, -1, (p-1)*(q-1))
PASSWORD = b"give me the flag!!!"
print("--------------------------------------------------------------")
print(" Welcome to the secure signing app! ")
print(" I will sign whatever you want, except the secret password. ")
print("--------------------------------------------------------------")
print()
print("--------------------------------------------------------------")
print("\n".join(textwrap.wrap(f"{n = }", len("-------------------------------------------------------------"))))
print("--------------------------------------------------------------")
print()
while True:
print("1. Sign")
print("2. Get flag")
choice = int(input())
if choice == 1:
print("Enter message:")
message = input().encode()
# crc32 is secure and has no collisions, but just in case
if message == PASSWORD or crc32(message) == crc32(PASSWORD):
print("Stop this trickery!")
exit()
print("Signature:", pow(crc32(message), d, n))
elif choice == 2:
print("Enter the signature for the password:")
s = int(input())
if pow(s, e, n) == crc32(PASSWORD):
print("You win! The flag is", open("flag.txt").read())
exit()
else:
print("Wrong.")
exit()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/forensic/crypto/gen.py | ctfs/ImaginaryCTF/2023/forensic/crypto/gen.py | #!/usr/bin/env python3
import os
key = [line.strip() for line in open("private.pem", "rb").readlines()[1:-1]]
c = open("core.raw", "rb").read() # coredump of `python3 script.py`
for line in key:
c = c.replace(line, b"A"*len(line))
open("core", "wb").write(c)
os.system("openssl rsautl -encrypt -inkey public.pem -pubin -in flag.txt -out flag.enc")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/forensic/crypto/script.py | ctfs/ImaginaryCTF/2023/forensic/crypto/script.py | from Crypto.PublicKey import RSA
t = open('private.pem', "r").read()
key = RSA.importKey(t)
input()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/web/amogus/auth/app.py | ctfs/ImaginaryCTF/2023/web/amogus/auth/app.py | from flask import Flask, request, make_response, redirect, url_for
from jinja2 import Environment, select_autoescape, FileSystemLoader
from flask_sqlalchemy import SQLAlchemy
app = Flask(__name__)
app.config["SQLALCHEMY_DATABASE_URI"] = "sqlite:////database.db"
app.config["SQLALCHEMY_TRACK_MODIFICATIONS"] = False
db = SQLAlchemy(app)
loader = FileSystemLoader(searchpath="templates/")
env = Environment(loader=loader)
class User(db.Model):
id = db.Column(db.Integer, primary_key=True)
username = db.Column(db.String(50), unique=True, nullable=False)
password = db.Column(db.String(50), nullable=False)
email = db.Column(db.String(100), nullable=False)
emails = db.relationship("Email", backref="user", lazy=True)
def __repr__(self):
return f"User('{self.username}', '{self.email}')"
class Email(db.Model):
id = db.Column(db.Integer, primary_key=True)
subject = db.Column(db.String(100), nullable=False)
body = db.Column(db.Text, nullable=False)
user_id = db.Column(db.Integer, db.ForeignKey("user.id"), nullable=False)
def __repr__(self):
return f"Email('{self.subject}', '{self.body}')"
@app.route('/', methods=["GET", "POST"])
def login():
if request.method == "GET":
error = request.args.get("error", "")
return make_response(env.get_template("login.html").render(error=error))
if request.method == "POST":
username = request.form["username"]
password = request.form["password"]
user = User.query.filter_by(username=username).first()
if user and user.password == password:
return redirect(f"http://mail.supersus.corp/auth?auth={password}")
else:
error = "Invalid username or password."
return redirect(url_for("login", error=error))
if __name__ == "__main__":
with app.app_context():
app.run("0.0.0.0", port=8081)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/web/amogus/mail/app.py | ctfs/ImaginaryCTF/2023/web/amogus/mail/app.py | from flask import Flask, render_template, request, make_response, redirect
from flask_sqlalchemy import SQLAlchemy
import os
import random
import string
import faker
app = Flask(__name__)
app.config["SQLALCHEMY_DATABASE_URI"] = "sqlite:////database.db"
app.config["SQLALCHEMY_TRACK_MODIFICATIONS"] = False
fake = faker.Faker()
db = SQLAlchemy(app)
class User(db.Model):
id = db.Column(db.Integer, primary_key=True)
username = db.Column(db.String(50), unique=True, nullable=False)
password = db.Column(db.String(50), nullable=False)
email = db.Column(db.String(100), nullable=False)
emails = db.relationship("Email", backref="user", lazy=True)
def __repr__(self):
return f"User('{self.username}', '{self.email}')"
class Email(db.Model):
id = db.Column(db.Integer, primary_key=True)
subject = db.Column(db.String(100), nullable=False)
body = db.Column(db.Text, nullable=False)
user_id = db.Column(db.Integer, db.ForeignKey("user.id"), nullable=False)
def __repr__(self):
return f"Email('{self.subject}', '{self.body}')"
@app.route("/")
def index():
users = User.query.all()
return render_template("index.html", users=users), 200
@app.route("/auth")
def auth():
response = make_response(redirect('/'))
response.set_cookie('auth', request.args.get("auth", ""))
return response, 200
@app.route("/emails/<int:user_id>")
def view_emails(user_id):
user = User.query.get_or_404(user_id)
if not "auth" in request.cookies or request.cookies["auth"] != user.password:
return "Unauthorized", 404
keyword = request.args.get("search", "")
emails = Email.query.filter_by(user_id=user.id).filter(
(Email.subject.contains(keyword)) | (Email.body.contains(keyword))
).all()
if not emails:
return render_template("emails.html", user=user, emails=emails), 404
else:
return render_template("emails.html", user=user, emails=emails), 200
def initialize():
users = []
users.append(User(username="admin", email="admin@supersus.corp", password=open("secret.txt").read().strip()))
for name in ["red", "blue", "green", "pink", "orange", "yellow", "black", "white", "purple", "brown", "cyan", "lime", "maroon", "rose", "banana", "gray", "tan", "coral"]:
users.append(User(username=name, email=f"{name}@supersus.corp", password="".join(random.choice(string.ascii_letters) for n in range(20))))
emails = []
for _ in range(500):
emails.append(Email(subject=f"Message from {fake.company()}", body=fake.text(), user=random.choice(users)))
emails.append(Email(subject=f"Message from ImaginaryCTF", body=open("flag.txt").read(), user=users[0]))
for _ in range(500):
emails.append(Email(subject=f"Message from {fake.company()}", body=fake.text(), user=random.choice(users)))
items = []
items.extend(users)
items.extend(emails)
db.session.add_all(items)
db.session.commit()
if __name__ == "__main__":
with app.app_context():
os.system("rm /database.db")
db.create_all()
initialize()
app.run("0.0.0.0", port=8080)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2023/web/Perfect_Picture/app.py | ctfs/ImaginaryCTF/2023/web/Perfect_Picture/app.py | from flask import Flask, render_template, request
from PIL import Image
import exiftool
import random
import os
app = Flask(__name__)
app.debug = False
os.system("mkdir /dev/shm/uploads/")
app.config['UPLOAD_FOLDER'] = '/dev/shm/uploads/'
app.config['ALLOWED_EXTENSIONS'] = {'png'}
def check(uploaded_image):
with open('flag.txt', 'r') as f:
flag = f.read()
with Image.open(app.config['UPLOAD_FOLDER'] + uploaded_image) as image:
w, h = image.size
if w != 690 or h != 420:
return 0
if image.getpixel((412, 309)) != (52, 146, 235, 123):
return 0
if image.getpixel((12, 209)) != (42, 16, 125, 231):
return 0
if image.getpixel((264, 143)) != (122, 136, 25, 213):
return 0
with exiftool.ExifToolHelper() as et:
metadata = et.get_metadata(app.config['UPLOAD_FOLDER'] + uploaded_image)[0]
try:
if metadata["PNG:Description"] != "jctf{not_the_flag}":
return 0
if metadata["PNG:Title"] != "kool_pic":
return 0
if metadata["PNG:Author"] != "anon":
return 0
except:
return 0
return flag
def allowed_file(filename):
return '.' in filename and filename.rsplit('.', 1)[1].lower() in app.config['ALLOWED_EXTENSIONS']
@app.route('/')
def index():
return render_template('index.html')
@app.route('/upload', methods=['POST'])
def upload():
if 'file' not in request.files:
return 'no file selected'
file = request.files['file']
if file.filename == '':
return 'no file selected'
if file and allowed_file(file.filename):
filename = file.filename
img_name = f'{str(random.randint(10000, 99999))}.png'
file.save(app.config['UPLOAD_FOLDER'] + img_name)
res = check(img_name)
if res == 0:
os.remove(app.config['UPLOAD_FOLDER'] + img_name)
return("hmmph. that image didn't seem to be good enough.")
else:
os.remove(app.config['UPLOAD_FOLDER'] + img_name)
return("now that's the perfect picture:<br>" + res)
return 'invalid file'
if __name__ == '__main__':
app.run()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/pwn/FormatStringFoolery/wrapper.py | ctfs/ImaginaryCTF/2022/pwn/FormatStringFoolery/wrapper.py | #!/usr/bin/env python3
from subprocess import PIPE, Popen
import sys
flag = open("flag.txt", "rb").read().strip()
# thanks to pepsipu for the idea
sys.stdout.write("Enter input:\n")
inp = sys.stdin.readline().encode()
for _ in range(10):
p = Popen("./fmt_foolery", stdin=PIPE, stdout=PIPE, stderr=PIPE)
if flag in p.communicate(input=inp, timeout=4)[0]:
sys.stdout.write(f"passed round {_}\n")
else:
sys.stdout.write(f"failed round {_}\n")
exit()
sys.stdout.write(f"Your flag is {flag}\n")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/pwn/pywrite/vuln.py | ctfs/ImaginaryCTF/2022/pwn/pywrite/vuln.py | from ctypes import c_ulong
def read(where):
return c_ulong.from_address(where).value
def write(what, where):
c_ulong.from_address(where).value = what
menu = '''|| PYWRITE ||
1: read
2: write
> '''
while True:
choice = int(input(menu))
if choice == 1:
where = int(input("where? "))
print(read(where))
if choice == 2:
what = int(input("what? "))
where = int(input("where? "))
write(what, where)
if choice == 3:
what = input("what????? ")
a = open(what)
print(a)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/rev/desrever/desrever.py | ctfs/ImaginaryCTF/2022/rev/desrever/desrever.py | #!/usr/bin/env python3
cexe = exec
cexe(')]"}0p381o91_flnj_3ycvgyhz_av_tavferire{sgpv"==)]pni ni _ rof _ esle "9876543210_}{" ni ton _ fi ]_[d.siht[(nioj.""[)"tcerroc","gnorw"((tnirp;)" >>>"(tupni=pni;)"?galf eht si tahW"(tnirp;siht tropmi'[::-1])
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/rev/OneLinerRevenge/revenge.py | ctfs/ImaginaryCTF/2022/rev/OneLinerRevenge/revenge.py | [globals().__setitem__(chr(0x67),globals()),g.__setitem__(chr(0x74),lambda*a:bytes.fromhex('{:x}'.format(a[0])).decode()),g.__setitem__(t(103),type('',(dict,),{t(6872320826472685407):lambda*a:{**{_:getattr(a[0],t(115298706365414908258770783))(*[(i%8if type(i)is(1).__class__ else i)for(i)in _[::-1]])for(_)in a[1:]},a.__reduce__:a[0]}.popitem()[len(a)%2*2-1],t(115298485004486023744151391):lambda*a:dict.__getitem__(*[(i%8if type(i)is(4).__class__ else i)for(i)in a])})()),[g((lambda*a:(print(*a),exit()),13463))((type('',([].__class__,),{t(6872326324148002655):lambda*a:1,t(6872320826472685407):lambda*a:g(([a[0].insert(0,list.pop(a[0])),a[0]][1][a[-1]],14701)),t(107135549927012):lambda*a:[list.append(a[0],_)for(_)in a[1:]],t(7368560):lambda*a:(list.pop(a[0]),a[0].reverse())[0]})(),10397))[14413].append(*[g()[11677],*[lambda*a:g[11975](t(28271))]*15]),g((open(t(540221431545043700576377)).read(),14122)),g()[11391]][any(any(_ in t(2524869067539096330)for(_)in(i))for(i)in open(t(241425488694318497730177+298795942850725202846200)))+1]((t(28271),t(1654445085483638585692+382008194344550889925))),[g((g((lambda*a:int(''.join(str(1*i)for(i)in(a)),2),12614))[15301].__getattribute__(t(1759314143624509480799))(),13195))[9923].append(*(lambda*a:(51*a[10]+56*a[0]+12*a[14]+91*a[3]+9*a[14]==96*a[19]+96*a[9]+83*a[1]+91*a[1]+43*a[22]-11543,88*a[7]+51*a[7]+27*a[9]+77*a[1]+45*a[4]==53*a[15]+6*a[22]+92*a[5]+15*a[9]+86*a[22]+7184,63*a[3]+76*a[0]+93*a[5]+64*a[3]+17*a[6]==74*a[23]+30*a[11]+21*a[9]+63*a[8]+66*a[23]+405,33*a[14]+47*a[14]+10*a[7]+97*a[18]+86*a[10]==85*a[16]+92*a[13]+45*a[19]+68*a[23]+15*a[2]-9791),lambda*a:(67*a[8]+13*a[13]+16*a[3]+17*a[20]+44*a[9]==36*a[22]+38*a[15]+72*a[23]+89*a[19]+43*a[17]-13909,36*a[19]+8*a[5]+43*a[23]+73*a[23]+78*a[3]==31*a[0]+15*a[22]+66*a[12]+48*a[21]+5*a[12]+9943,23*a[19]+68*a[23]+10*a[8]+59*a[17]+34*a[1]==20*a[18]+55*a[1]+20*a[17]+32*a[6]+39*a[2]+3539,5*a[0]+69*a[10]+25*a[18]+61*a[17]+97*a[14]==64*a[18]+29*a[18]+39*a[10]+93*a[0]+23*a[15]-5075),lambda*a:(2*a[20]+47*a[0]+80*a[16]+37*a[4]+60*a[15]==29*a[13]+21*a[11]+4*a[23]+83*a[9]+55*a[16]+10561,28*a[4]+42*a[16]+39*a[16]+3*a[20]+63*a[1]==11*a[10]+31*a[19]+9*a[19]+30*a[8]+74*a[16]+2148,78*a[21]+4*a[15]+62*a[18]+84*a[7]+96*a[16]==24*a[7]+23*a[14]+94*a[3]+46*a[2]+67*a[17]+7330,74*a[12]+66*a[0]+92*a[2]+73*a[16]+62*a[10]==18*a[2]+28*a[3]+40*a[17]+60*a[21]+54*a[17]+19097),lambda*a:(49*a[21]+62*a[12]+39*a[19]+6*a[2]+33*a[18]==65*a[14]+40*a[11]+51*a[3]+38*a[14]+61*a[17]+1787,72*a[2]+41*a[9]+17*a[2]+94*a[17]+64*a[6]==53*a[8]+69*a[7]+30*a[9]+27*a[3]+17*a[0]+13621,76*a[20]+52*a[6]+42*a[12]+32*a[21]+15*a[4]==93*a[16]+45*a[10]+76*a[15]+30*a[8]+97*a[14]-8576,49*a[13]+5*a[16]+66*a[22]+6*a[0]+15*a[4]==58*a[19]+78*a[15]+41*a[2]+3*a[15]+41*a[21]-14144),lambda*a:(81*a[7]+15*a[6]+83*a[21]+51*a[10]+25*a[15]==78*a[16]+36*a[18]+89*a[8]+74*a[9]+28*a[15]-5576,22*a[12]+69*a[7]+43*a[14]+22*a[20]+88*a[20]==92*a[6]+40*a[10]+13*a[21]+93*a[4]+69*a[8]-14574,5*a[12]+55*a[15]+38*a[23]+79*a[18]+73*a[2]==7*a[6]+68*a[13]+46*a[19]+56*a[23]+84*a[15]-1064,63*a[5]+3*a[15]+54*a[11]+53*a[17]+39*a[22]==90*a[13]+58*a[7]+80*a[14]+43*a[20]+1*a[2]-9663),lambda*a:(33*a[4]+85*a[22]+88*a[19]+11*a[19]+65*a[3]==2*a[12]+83*a[15]+51*a[3]+53*a[2]+4*a[15]+2150,16*a[13]+6*a[21]+19*a[23]+49*a[21]+48*a[9]==96*a[4]+60*a[7]+73*a[11]+79*a[9]+67*a[13]-17330,32*a[22]+25*a[14]+36*a[12]+96*a[11]+74*a[7]==65*a[6]+97*a[11]+22*a[21]+82*a[6]+58*a[4]-15919,58*a[6]+91*a[6]+48*a[15]+60*a[21]+84*a[9]==81*a[14]+3*a[2]+3*a[15]+17*a[13]+28*a[19]+23080),lambda*a:(8*a[11]+13*a[23]+70*a[20]+4*a[14]+25*a[16]==47*a[13]+56*a[9]+14*a[16]+14*a[5]+47*a[19]-2509,56*a[16]+35*a[7]+71*a[15]+82*a[11]+43*a[18]==89*a[9]+5*a[20]+38*a[10]+16*a[17]+16*a[8]+13008,60*a[22]+16*a[2]+79*a[3]+5*a[22]+99*a[7]==22*a[20]+75*a[11]+31*a[6]+4*a[15]+53*a[3]+1557,22*a[12]+36*a[19]+84*a[16]+6*a[22]+44*a[15]==94*a[18]+46*a[0]+7*a[9]+16*a[13]+69*a[23]-5508),lambda*a:(15*a[14]+37*a[4]+89*a[19]+1*a[13]+40*a[21]==58*a[7]+84*a[2]+95*a[17]+88*a[7]+58*a[8]-13680,21*a[2]+72*a[16]+92*a[14]+29*a[8]+94*a[16]==60*a[13]+90*a[16]+64*a[17]+66*a[2]+45*a[2]-7275,85*a[4]+56*a[21]+39*a[20]+5*a[9]+86*a[21]==46*a[11]+85*a[2]+79*a[20]+84*a[11]+87*a[10]-3608,98*a[13]+9*a[0]+94*a[21]+81*a[0]+92*a[16]==18*a[16]+30*a[0]+18*a[9]+17*a[17]+9*a[18]+32955),lambda*a:(99*a[13]+17*a[8]+43*a[22]+35*a[15]+63*a[11]==75*a[15]+65*a[11]+44*a[17]+68*a[14]+71*a[6]-6000,96*a[15]+77*a[19]+70*a[22]+36*a[5]+40*a[12]==92*a[8]+78*a[21]+18*a[13]+27*a[19]+64*a[19]-2898,64*a[9]+94*a[17]+20*a[16]+57*a[6]+76*a[5]==57*a[2]+66*a[21]+82*a[0]+95*a[15]+70*a[19]-16423,35*a[1]+43*a[22]+7*a[21]+88*a[9]+72*a[11]==79*a[6]+66*a[17]+43*a[1]+80*a[6]+13*a[6]-16177),lambda*a:(15*a[14]+72*a[0]+60*a[2]+66*a[17]+57*a[14]==43*a[5]+79*a[2]+3*a[16]+17*a[1]+64*a[6]+4715,46*a[8]+93*a[3]+59*a[20]+15*a[14]+84*a[6]==49*a[18]+46*a[14]+41*a[6]+37*a[1]+98*a[13]+3571,50*a[20]+62*a[5]+24*a[1]+91*a[23]+59*a[16]==52*a[20]+37*a[5]+60*a[18]+59*a[18]+25*a[11]+6503,19*a[3]+96*a[19]+38*a[22]+34*a[5]+27*a[14]==61*a[21]+74*a[10]+1*a[10]+86*a[17]+62*a[21]-14623),lambda*a:(94*a[21]+46*a[8]+21*a[14]+46*a[0]+49*a[17]==81*a[8]+97*a[8]+82*a[4]+4*a[6]+67*a[8]-10410,65*a[1]+26*a[7]+14*a[23]+51*a[22]+20*a[4]==19*a[18]+87*a[16]+27*a[21]+57*a[10]+88*a[22]-10505,83*a[17]+89*a[21]+57*a[21]+19*a[19]+42*a[3]==12*a[8]+7*a[0]+83*a[9]+8*a[10]+79*a[5]+20536,30*a[19]+67*a[17]+10*a[1]+13*a[2]+47*a[1]==87*a[10]+95*a[11]+9*a[15]+41*a[3]+80*a[16]-11542),lambda*a:(98*a[4]+29*a[16]+91*a[16]+25*a[13]+94*a[20]==41*a[17]+63*a[3]+61*a[7]+28*a[10]+89*a[7]+17506,28*a[8]+90*a[16]+12*a[20]+65*a[6]+69*a[5]==87*a[11]+33*a[4]+20*a[6]+10*a[15]+23*a[7]+11861,52*a[11]+99*a[3]+62*a[17]+69*a[12]+36*a[11]==71*a[0]+25*a[15]+49*a[6]+56*a[8]+87*a[10]-3286,95*a[0]+24*a[2]+11*a[13]+40*a[3]+85*a[18]==37*a[9]+49*a[3]+15*a[2]+51*a[11]+71*a[6]+8832),lambda*a:(22*a[7]+92*a[13]+66*a[21]+16*a[3]+89*a[17]==45*a[22]+26*a[17]+88*a[18]+78*a[22]+29*a[11]+11656,53*a[3]+77*a[18]+61*a[23]+81*a[16]+30*a[15]==70*a[16]+89*a[22]+4*a[13]+23*a[15]+94*a[18]+9747,90*a[20]+70*a[10]+53*a[0]+26*a[5]+29*a[20]==73*a[6]+21*a[21]+6*a[23]+88*a[17]+43*a[1]+3403,62*a[3]+59*a[10]+88*a[0]+77*a[9]+37*a[5]==88*a[12]+81*a[9]+49*a[17]+81*a[16]+28*a[2]-2875),lambda*a:(22*a[7]+44*a[2]+18*a[6]+73*a[1]+51*a[4]==40*a[22]+97*a[13]+27*a[4]+70*a[23]+66*a[15]-10554,18*a[23]+76*a[20]+94*a[18]+1*a[0]+87*a[5]==90*a[17]+20*a[13]+86*a[2]+28*a[12]+89*a[0]-7968,14*a[17]+38*a[20]+4*a[2]+63*a[22]+54*a[6]==48*a[11]+69*a[6]+60*a[23]+35*a[6]+87*a[7]-11706,68*a[18]+78*a[7]+31*a[10]+45*a[9]+73*a[13]==23*a[23]+14*a[7]+91*a[12]+99*a[4]+8*a[8]-445),lambda*a:(50*a[17]+66*a[20]+19*a[20]+56*a[5]+22*a[7]==77*a[2]+76*a[18]+79*a[11]+87*a[0]+65*a[13]-19932,90*a[19]+11*a[17]+61*a[21]+27*a[8]+43*a[19]==11*a[0]+41*a[19]+4*a[5]+57*a[3]+54*a[15]+7163,24*a[2]+7*a[8]+81*a[23]+42*a[6]+30*a[20]==35*a[10]+4*a[14]+87*a[18]+88*a[5]+46*a[10]-1649,27*a[5]+34*a[12]+16*a[0]+39*a[7]+89*a[10]==58*a[17]+22*a[20]+6*a[14]+20*a[4]+1*a[14]+7194),lambda*a:(39*a[5]+95*a[16]+29*a[12]+35*a[20]+2*a[23]==52*a[11]+36*a[5]+72*a[20]+47*a[10]+27*a[20]-837,37*a[13]+78*a[1]+79*a[15]+73*a[22]+96*a[6]==51*a[18]+71*a[20]+79*a[2]+60*a[8]+32*a[14]+3156,95*a[17]+8*a[17]+35*a[8]+22*a[7]+89*a[15]==26*a[20]+50*a[2]+67*a[1]+70*a[10]+30*a[14]+1114,87*a[7]+56*a[10]+41*a[7]+22*a[3]+44*a[3]==81*a[6]+79*a[12]+40*a[22]+37*a[15]+66*a[12]-10364))),g((input(t(1044266528)).encode(),15553)),g[15623]][(t(26122)[1]in g()[11618])+1]((t(11058375319408232550098454217411120665270488946811366757),t(439956237345))),[g[14349](g()[15726](*g()[10963].pop()(*g()[(3).__class__(g[13890][138])])))for(i)in iter(g()[10987].__len__,0)],g[10839](t(7955827))] | python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/SecureEncodingBase64/encode.py | ctfs/ImaginaryCTF/2022/crypto/SecureEncodingBase64/encode.py | #!/usr/bin/env python3
from base64 import b64encode
from random import shuffle
charset = b'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+/='
shuffled = [i for i in charset]
shuffle(shuffled)
d = {charset[i]:v for(i,v)in enumerate(shuffled)}
pt = open("flag.txt").read()
while "\n\n\n" in pt:
pt = pt.replace("\n\n\n", '\n\n')
while ' ' in pt:
pt = pt.replace(' ', ' ')
assert all(ord(i)<128 for i in pt)
ct = bytes(d[i] for i in b64encode(pt.encode()))
f = open('out.txt', 'wb')
f.write(ct)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/huge/chal.py | ctfs/ImaginaryCTF/2022/crypto/huge/chal.py | from Crypto.Util.number import bytes_to_long, getPrime
from random import randint
flag = open("flag.txt", "rb").read()
def get_megaprime():
primes = [getPrime(10) for _ in range(200)]
out = 1
for n in range(100):
if randint(0,1) == 0:
out *= primes[n]
return out
p = get_megaprime()
q = get_megaprime()
n = p*q
e = 65537
m = bytes_to_long(flag)
c = pow(m, e, n)
print(f"{n = }")
print(f"{e = }")
print(f"{c = }")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/Poker/poker.py | ctfs/ImaginaryCTF/2022/crypto/Poker/poker.py | from random import getrandbits
from math import prod
HEARTS = "๐ฑ๐ฒ๐ณ๐ด๐ต๐ถ๐ท๐ธ๐น๐บ๐ป๐ฝ๐พ"
SPADES = "๐ก๐ข๐ฃ๐ค๐ฅ๐ฆ๐ง๐จ๐ฉ๐ช๐ซ๐ญ๐ฎ"
DIAMONDS = "๐๐๐๐๐
๐๐๐๐๐๐๐๐"
CLUBS = "๐๐๐๐๐๐๐๐๐๐๐๐๐"
DECK = SPADES+HEARTS+DIAMONDS+CLUBS # Bridge Ordering of a Deck
ALPHABET52 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnop_rstuvw{y}"
CARDS_PER_DEAL = 25
assert CARDS_PER_DEAL % 2 == 1
MAX_DEAL = prod(x for x in range(len(DECK) - CARDS_PER_DEAL + 1, len(DECK) + 1))
DEAL_BITS = MAX_DEAL.bit_length()
def text_from_cards(string):
return string.translate(string.maketrans(DECK, ALPHABET52))
def deal_game():
shuffle = getrandbits(DEAL_BITS) % MAX_DEAL
deck = list(DECK)
deal = ""
while shuffle > 0:
deal += deck.pop(shuffle % len(deck))
shuffle //= len(deck) + 1
while len(deal) < CARDS_PER_DEAL:
deal += deck.pop(0)
return deal
def print_puzzle():
with open("cards.txt", "w") as cards_file:
for i in range(750):
table = deal_game()
cards_file.write(f"Game {i+1}:\n")
for i in range((CARDS_PER_DEAL - 5) // 2):
cards_file.write(f"{i + 1}: {table[i * 2]}{table[i * 2 + 1]} ")
cards_file.write("\nTable: {}{}{} {} {}\n\n".format(*table[CARDS_PER_DEAL - 5:]))
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/hash/chal.py | ctfs/ImaginaryCTF/2022/crypto/hash/chal.py | #!/usr/bin/env python3
import string
import random
config = [[int(a) for a in n.strip()] for n in open("jbox.txt").readlines()] # sbox pbox jack in the box
# secure hashing algorithm 42
def sha42(s: bytes, rounds=42):
out = [0]*21
for round in range(rounds):
for c in range(len(s)):
if config[((c//21)+round)%len(config)][c%21] == 1:
out[(c+round)%21] ^= s[c]
return bytes(out).hex()
def main():
print("Can you guess my passwords?")
for trial in range(50):
print(f"--------ROUND {trial}--------")
password = "".join([random.choice(string.printable) for _ in range(random.randint(15,20))]).encode()
hash = sha42(password)
print(f"sha42(password) = {hash}")
guess = bytes.fromhex(input("hex(password) = ").strip())
if sha42(guess) == hash:
print("Correct!")
else:
print("Incorrect. Try again next time.")
exit(-1)
flag = open("flag.txt", "r").read()
print(f"Congrats! Your flag is: {flag}")
if __name__ == "__main__":
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/SecureEncodingHex/encode.py | ctfs/ImaginaryCTF/2022/crypto/SecureEncodingHex/encode.py | #!/usr/bin/env python3
from random import shuffle
charset = '0123456789abcdef'
shuffled = [i for i in charset]
shuffle(shuffled)
d = {charset[i]:v for(i,v)in enumerate(shuffled)}
pt = open("flag.txt").read()
assert all(ord(i)<128 for i in pt)
ct = ''.join(d[i] for i in pt.encode().hex())
f = open('out.txt', 'w')
f.write(ct)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/LivingWithoutExpectations/lwe.py | ctfs/ImaginaryCTF/2022/crypto/LivingWithoutExpectations/lwe.py | import numpy as np
import secrets
def rand(seed):
seeds = [(seed >> (3 * i)) & 7 for i in range(nseeds)]
a = 5
b = 7
while True:
for i in range(nseeds):
seeds[i] = (a * seeds[i] + b) & 7
yield seeds[i]
q = 2**142 + 217
n = 69
nseeds = 142
rng = rand(secrets.randbits(3 * nseeds))
with open("flag.txt", "rb") as f:
flag = f.read().strip()
bits = f'{int.from_bytes(flag, "big"):0{len(flag) * 8}b}'
s = np.array([secrets.randbits(1) for _ in range(n)])
for bit in map(int, bits):
A = np.array([secrets.randbelow(q) for _ in range(n * n)]).reshape((n, n))
b = [A @ s + np.array([next(rng) for _ in range(n)]), np.array([secrets.randbelow(q) for _ in range(n)])][bit]
print(list(map(hex, A.reshape(-1))), list(map(hex, b % q)))
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/smoll/smoll.py | ctfs/ImaginaryCTF/2022/crypto/smoll/smoll.py | from secret import p, q
from sage.all import factor
for r in [p, q]:
for s, _ in factor(r - 1):
assert int(s).bit_length() <= 20
n = p * q
e = 0x10001
with open("flag.txt", "rb") as f:
flag = int.from_bytes(f.read().strip(), "big")
assert flag < n
ct = pow(flag, e, n)
print(f"{n = }")
print(f"{e = }")
print(f"{ct = }")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/cbc/cbc.py | ctfs/ImaginaryCTF/2022/crypto/cbc/cbc.py | from Crypto.Cipher import AES
from Crypto.Util.Padding import pad, unpad
from os import urandom
def cbc_encrypt(msg: bytes):
msg = pad(msg, 16)
msg = [msg[i:i+16] for i in range(0, len(msg), 16)]
key = urandom(16)
out = []
for block in msg:
cipher = AES.new(key, AES.MODE_ECB)
next = cipher.encrypt(block)
out.append(next)
key = next
out = b"".join(out)
return key, out
def main():
key, ct = cbc_encrypt(open("flag.txt", "rb").read()*3)
print(f"{ct = }")
if __name__ == "__main__":
main()
# ct = b"\xa2\xb8 <\xf2\x85\xa3-\xd1\x1aM}\xa9\xfd4\xfag<p\x0e\xb7|\xeb\x05\xcbc\xc3\x1e\xc3\xefT\x80\xd3\xa4 ~$\xceXb\x9a\x04\xf0\xc6\xb6\xd6\x1c\x95\xd1(O\xcfx\xf2z_\xc3\x87\xa6\xe9\x00\x1d\x9f\xa7\x0bm\xca\xea\x1e\x95T[Q\x80\x07we\x96)t\xdd\xa9A 7dZ\x9d\xfc\xdbA\x14\xda9\xf3\xeag\xe3\x1a\xc8\xad\x1cnL\x91\xf6\x83'\xaa\xaf\xf3i\xc0t=\xcd\x02K\x81\xb6\xfa.@\xde\xf5\xaf\xa3\xf1\xe3\xb4?\xf9,\xb2:i\x13x\xea1\xa0\xc1\xb9\x84"
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/otp/otp.py | ctfs/ImaginaryCTF/2022/crypto/otp/otp.py | #!/usr/bin/env python3
from Crypto.Util.number import long_to_bytes, bytes_to_long
import random
import math
def secureRand(bits, seed):
jumbler = []
jumbler.extend([2**n for n in range(300)])
jumbler.extend([3**n for n in range(300)])
jumbler.extend([4**n for n in range(300)])
jumbler.extend([5**n for n in range(300)])
jumbler.extend([6**n for n in range(300)])
jumbler.extend([7**n for n in range(300)])
jumbler.extend([8**n for n in range(300)])
jumbler.extend([9**n for n in range(300)])
out = ""
state = seed % len(jumbler)
for _ in range(bits):
if int(str(jumbler[state])[0]) < 5:
out += "1"
else:
out += "0"
state = int("".join([str(jumbler[random.randint(0, len(jumbler)-1)])[0] for n in range(len(str(len(jumbler)))-1)]))
return long_to_bytes(int(out, 2)).rjust(bits//8, b'\0')
def xor(var, key):
return bytes(a ^ b for a, b in zip(var, key))
def main():
print("Welcome to my one time pad as a service!")
flag = open("flag.txt", "rb").read()
seed = random.randint(0, 100000000)
while True:
inp = input("Enter plaintext: ").encode()
if inp == b"FLAG":
print("Encrypted flag:", xor(flag, secureRand(len(flag)*8, seed)).hex())
else:
print("Encrypted message:", xor(inp, secureRand(len(inp)*8, seed)).hex())
if __name__ == "__main__":
main()
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/crypto/Lorge/lorge.py | ctfs/ImaginaryCTF/2022/crypto/Lorge/lorge.py | from secret import p, q
from sage.all import factor
for r in [p, q]:
for s, _ in factor(r - 1):
assert int(s).bit_length() <= 25
n = p * q
e = 0x10001
with open("flag.txt", "rb") as f:
flag = int.from_bytes(f.read().strip(), "big")
assert flag < n
ct = pow(flag, e, n)
print(f"{n = }")
print(f"{e = }")
print(f"{ct = }")
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
sajjadium/ctf-archives | https://github.com/sajjadium/ctf-archives/blob/129a3a9fe604443211fa4d493a49630c30689df7/ctfs/ImaginaryCTF/2022/web/maas/app.py | ctfs/ImaginaryCTF/2022/web/maas/app.py | from flask import Flask, render_template, request, make_response, redirect
from hashlib import sha256
import time
import uuid
import random
app = Flask(__name__)
memes = [l.strip() for l in open("memes.txt").readlines()]
users = {}
taken = []
def adduser(username):
if username in taken:
return "username taken", "username taken"
password = "".join([random.choice("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789") for _ in range(30)])
cookie = sha256(password.encode()).hexdigest()
users[cookie] = {"username": username, "id": str(uuid.uuid1())}
taken.append(username)
return cookie, password
@app.route('/')
def index():
return redirect("/login")
@app.route('/users')
def listusers():
return render_template('users.html', users=users)
@app.route('/users/<id>')
def getuser(id):
for k in users.keys():
if users[k]["id"] == id:
return f"Under construction.<br><br>User {users[k]['username']} is a very cool user!"
@app.route('/login', methods=['GET', 'POST'])
def login():
if request.method == "POST":
resp = make_response(redirect('/home'))
cookie = sha256(request.form["password"].encode()).hexdigest()
resp.set_cookie('auth', cookie)
return resp
else:
return render_template('login.html')
@app.route('/register', methods=['GET', 'POST'])
def register():
if request.method == "POST":
cookie, password = adduser(request.form["username"])
resp = make_response(f"Username: {request.form['username']}<br>Password: {password}")
resp.set_cookie('auth', cookie)
return f"Username: {request.form['username']}<br>Password: {password}"
else:
return render_template('register.html')
@app.route('/home', methods=['GET'])
def home():
cookie = request.cookies.get('auth')
username = users[cookie]["username"]
if username == 'admin':
flag = open('flag.txt').read()
return render_template('home.html', username=username, message=f'Your flag: {flag}', meme=random.choice(memes))
else:
return render_template('home.html', username=username, message='Only the admin user can view the flag.', meme=random.choice(memes))
@app.errorhandler(Exception)
def handle_error(e):
return redirect('/login')
def initialize():
random.seed(round(time.time(), 2))
adduser("admin")
initialize()
app.run('0.0.0.0', 8080)
| python | MIT | 129a3a9fe604443211fa4d493a49630c30689df7 | 2026-01-05T01:34:13.869332Z | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.